Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Celery.exe

Overview

General Information

Sample name:Celery.exe
Analysis ID:1432517
MD5:42c32b8ee377ce3bcf36f51fb7bc93a8
SHA1:819d0926c93704884a882967d820d6f753732d37
SHA256:c91c0745dcd02dbffa34747dd26e85e3e124a62d0812c125b6bc67792b66c8dc
Tags:exe
Infos:

Detection

PureLog Stealer, RedLine, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected zgRAT
Drops PE files with a suspicious file extension
Drops large PE files
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
File is packed with WinRar
Found dropped PE file which has not been started or loaded
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Execution of Suspicious File Type Extension
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match

Classification

  • System is w10x64
  • Celery.exe (PID: 5608 cmdline: "C:\Users\user\Desktop\Celery.exe" MD5: 42C32B8EE377CE3BCF36F51FB7BC93A8)
    • Celery V3.exe (PID: 7012 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe" MD5: 06E7DDAE83EEE00448A508F9BADAB598)
      • cmd.exe (PID: 5964 cmdline: "C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 3592 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 7036 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • tasklist.exe (PID: 928 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 5500 cmdline: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 7116 cmdline: cmd /c md 1101 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • findstr.exe (PID: 1396 cmdline: findstr /V "CalculationsExpediaJumpExchanges" Application MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 6608 cmdline: cmd /c copy /b Trials + Explains + External + Fighting + Get + Rights 1101\z MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • Spy.pif (PID: 6816 cmdline: 1101\Spy.pif 1101\z MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
          • RegAsm.exe (PID: 6120 cmdline: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
            • conhost.exe (PID: 2700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 1856 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      19.2.RegAsm.exe.540000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        19.2.RegAsm.exe.540000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          19.2.RegAsm.exe.540000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            19.2.RegAsm.exe.540000.0.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
            • 0x510b3:$s1: file:///
            • 0x50feb:$s2: {11111-22222-10009-11112}
            • 0x51043:$s3: {11111-22222-50001-00000}
            • 0x4dbc1:$s4: get_Module
            • 0x48dc7:$s5: Reverse
            • 0x49660:$s6: BlockCopy
            • 0x48daf:$s7: ReadByte
            • 0x510c5:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...

            System Summary

            barindex
            Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): Data: Command: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe, ParentCommandLine: 1101\Spy.pif 1101\z, ParentImage: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif, ParentProcessId: 6816, ParentProcessName: Spy.pif, ProcessCommandLine: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe, ProcessId: 6120, ProcessName: RegAsm.exe
            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 1101\Spy.pif 1101\z, CommandLine: 1101\Spy.pif 1101\z, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif, NewProcessName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif, OriginalFileName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5964, ParentProcessName: cmd.exe, ProcessCommandLine: 1101\Spy.pif 1101\z, ProcessId: 6816, ProcessName: Spy.pif

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5964, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 5500, ProcessName: findstr.exe
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeVirustotal: Detection: 12%Perma Link
            Source: Celery.exeVirustotal: Detection: 15%Perma Link
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifJoe Sandbox ML: detected
            Source: Celery.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000013.00000000.2570090970.0000000000462000.00000002.00000001.01000000.0000000C.sdmp, RegAsm.exe, 00000013.00000002.2864057648.00000000063A0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000013.00000002.2861250304.0000000005139000.00000004.00000020.00020000.00000000.sdmp, tmpF16.tmp.19.dr, tmpCBE8.tmp.19.dr, tmpD3BD.tmp.19.dr, tmpFFAA.tmp.19.dr, tmpD58B.tmp.19.dr, tmpFB00.tmp.19.dr, tmpE0EE.tmp.19.dr, tmpE99F.tmp.19.dr, tmpEF8D.tmp.19.dr, tmpE48.tmp.19.dr, tmpD2FD.tmp.19.dr, tmpCA15.tmp.19.dr, tmpEF3A.tmp.19.dr, tmp6E7.tmp.19.dr, tmpDAF1.tmp.19.dr, tmp41B.tmp.19.dr, tmpE89B.tmp.19.dr, tmpD536.tmp.19.dr, tmpFAA9.tmp.19.dr, tmpF2A9.tmp.19.dr, tmpFAEF.tmp.19.dr, tmp4E6.tmp.19.dr, tmpC82C.tmp.19.dr, tmpDB24.tmp.19.dr, tmpCACF.tmp.19.dr, tmp3F9.tmp.19.dr, tmpC907.tmp.19.dr, tmpF3A9.tmp.19.dr, tmpEEAD.tmp.19.dr, tmp35B.tmp.19.dr, tmpE8BF.tmp.19.dr, tmp169.tmp.19.dr, tmpDFD9.tmp.19.dr, tmpED02.tmp.19.dr, tmpFF53.tmp.19.dr, tmpFEEF.tmp.19.dr, tmpEBAB.tmp.19.dr, tmpD39.tmp.19.dr, tmpC617.tmp.19.dr, tmpD17.tmp.19.dr, tmpD659.tmp.19.dr, tmp54F.tmp.19.dr, tmpCCE6.tmp.19.dr, tmp28B.tmp.19.dr, tmpCCC3.tmp.19.dr, tmpD743.tmp.19.dr, tmpCD3B.tmp.19.dr, tmp739.tmp.19.dr, tmpFF32.tmp.19.dr, tmpFA1C.tmp.19.dr, tmpC67D.tmp.19.dr, tmp681.tmp.19.dr, tmpF123.tmp.19.dr, tmpCB96.tmp.19.dr, tmp122.tmp.19.dr, tmpD79B.tmp.19.dr, tmp4C4.tmp.19.dr, tmp77E.tmp.19.dr, tmpE8D1.tmp.19.dr, tmpE779.tmp.19.dr, tmp247.tmp.19.dr, tmpFADE.tmp.19.dr, tmpE904.tmp.19.dr, tmpC8F6.tmp.19.dr, tmpF262.tmp.19.dr, tmpEF6C.tmp.19.dr, tmp3D5.tmp.19.dr, tmpE811.tmp.19.dr, tmpD435.tmp.19.dr, tmpC84E.tmp.19.dr, tmpDFD8.tmp.19.dr, tmpD412.tmp.19.dr, tmpC86F.tmp.19.dr, tmpFDA9.tmp.19.dr, tmpEC57.tmp.19.dr, tmpE95D.tmp.19.dr, tmpECAA.tmp.19.dr, tmp75A.tmp.19.dr, tmpE9E5.tmp.19.dr, tmpE171.tmp.19.dr, tmpD9AD.tmp.19.dr, tmpEC23.tmp.19.dr, tmp7F4.tmp.19.dr, tmp36D.tmp.19.dr, tmpC629.tmp.19.dr, tmpF962.tmp.19.dr, tmpBD3.tmp.19.dr, tmp3A0.tmp.19.dr, tmpF1EA.tmp.19.dr, tmp51A.tmp.19.dr, tmpEBBC.tmp.19.dr, tmpFF77.tmp.19.dr, tmp76C.tmp.19.dr, tmpD502.tmp.19.dr, tmpDDD0.tmp.19.dr, tmpFA2E.tmp.19.dr, tmpD389.tmp.19.dr, tmpD501.tmp.19.dr, tmpDE25.tmp.19.dr, tmpD5BF.tmp.19.dr, tmpD9CE.tmp.19.dr, tmpD402.tmp.19.dr, tmpEB34.tmp.19.dr, tmpE79D.tmp.19.dr, tmpC17.tmp.19.dr, tmpEC02.tmp.19.dr, tmpEE00.tmp.19.dr, tmpD767.tmp.19.dr, tmpD28.tmp.19.dr, tmpEB9A.tmp.19.dr, tmpD733.tmp.19.dr, tmpFBCB.tmp.19.dr, tmpEEBF.tmp.19.dr, tmpDF63.tmp.19.dr, tmp2D0.tmp.19.dr, tmpFEBB.tmp.19.dr, tmpFEEE.tmp.19.dr, tmpEAA5.tmp.19.dr, tmpF2EB.tmp.19.dr, tmpE9A0.tmp.19.dr, tmpF9FA.tmp.19.dr, tmpDD69.tmp.19.dr, tmpC9F2.tmp.19.dr, tmpF0B0.tmp.19.dr, tmpD90C.tmp.19.dr, tmp43D.tmp.19.dr, tmpC8D4.tmp.19.dr, tmp593.tmp.19.dr, tmpC07.tmp.19.dr, tmpF06.tmp.19.dr, tmp43.tmp.19.dr, tmpDADF.tmp.19.dr, tmpCA8B.tmp.19.dr, tmpCC3B.tmp.19.dr, tmp3E7.tmp.19.dr, tmpC918.tmp.19.dr
            Source: Binary string: Flash.pdb source: scripts.dll
            Source: Binary string: Flash.pdbx source: scripts.dll
            Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000013.00000000.2570090970.0000000000462000.00000002.00000001.01000000.0000000C.sdmp, RegAsm.exe, 00000013.00000002.2864057648.00000000063A0000.00000004.00000020.00020000.00000000.sdmp, tmpF16.tmp.19.dr, tmpCBE8.tmp.19.dr, tmpD3BD.tmp.19.dr, tmpFFAA.tmp.19.dr, tmpD58B.tmp.19.dr, tmpFB00.tmp.19.dr, tmpE0EE.tmp.19.dr, tmpE99F.tmp.19.dr, tmpEF8D.tmp.19.dr, tmpE48.tmp.19.dr, tmpD2FD.tmp.19.dr, tmpCA15.tmp.19.dr, tmpEF3A.tmp.19.dr, tmp6E7.tmp.19.dr, tmpDAF1.tmp.19.dr, tmp41B.tmp.19.dr, tmpE89B.tmp.19.dr, tmpD536.tmp.19.dr, tmpFAA9.tmp.19.dr, tmpF2A9.tmp.19.dr, tmpFAEF.tmp.19.dr, tmp4E6.tmp.19.dr, tmpC82C.tmp.19.dr, tmpDB24.tmp.19.dr, tmpCACF.tmp.19.dr, tmp3F9.tmp.19.dr, tmpC907.tmp.19.dr, tmpF3A9.tmp.19.dr, tmpEEAD.tmp.19.dr, tmp35B.tmp.19.dr, tmpE8BF.tmp.19.dr, tmp169.tmp.19.dr, tmpDFD9.tmp.19.dr, tmpED02.tmp.19.dr, tmpFF53.tmp.19.dr, tmpFEEF.tmp.19.dr, tmpEBAB.tmp.19.dr, tmpD39.tmp.19.dr, tmpC617.tmp.19.dr, tmpD17.tmp.19.dr, tmpD659.tmp.19.dr, tmp54F.tmp.19.dr, tmpCCE6.tmp.19.dr, tmp28B.tmp.19.dr, tmpCCC3.tmp.19.dr, tmpD743.tmp.19.dr, tmpCD3B.tmp.19.dr, tmp739.tmp.19.dr, tmpFF32.tmp.19.dr, tmpFA1C.tmp.19.dr, tmpC67D.tmp.19.dr, tmp681.tmp.19.dr, tmpF123.tmp.19.dr, tmpCB96.tmp.19.dr, tmp122.tmp.19.dr, tmpD79B.tmp.19.dr, tmp4C4.tmp.19.dr, tmp77E.tmp.19.dr, tmpE8D1.tmp.19.dr, tmpE779.tmp.19.dr, tmp247.tmp.19.dr, tmpFADE.tmp.19.dr, tmpE904.tmp.19.dr, tmpC8F6.tmp.19.dr, tmpF262.tmp.19.dr, tmpEF6C.tmp.19.dr, tmp3D5.tmp.19.dr, tmpE811.tmp.19.dr, tmpD435.tmp.19.dr, tmpC84E.tmp.19.dr, tmpDFD8.tmp.19.dr, tmpD412.tmp.19.dr, tmpC86F.tmp.19.dr, tmpFDA9.tmp.19.dr, tmpEC57.tmp.19.dr, tmpE95D.tmp.19.dr, tmpECAA.tmp.19.dr, tmp75A.tmp.19.dr, tmpE9E5.tmp.19.dr, tmpE171.tmp.19.dr, tmpD9AD.tmp.19.dr, tmpEC23.tmp.19.dr, tmp7F4.tmp.19.dr, tmp36D.tmp.19.dr, tmpC629.tmp.19.dr, tmpF962.tmp.19.dr, tmpBD3.tmp.19.dr, tmp3A0.tmp.19.dr, tmpF1EA.tmp.19.dr, tmp51A.tmp.19.dr, tmpEBBC.tmp.19.dr, tmpFF77.tmp.19.dr, tmp76C.tmp.19.dr, tmpD502.tmp.19.dr, tmpDDD0.tmp.19.dr, tmpFA2E.tmp.19.dr, tmpD389.tmp.19.dr, tmpD501.tmp.19.dr, tmpDE25.tmp.19.dr, tmpD5BF.tmp.19.dr, tmpD9CE.tmp.19.dr, tmpD402.tmp.19.dr, tmpEB34.tmp.19.dr, tmpE79D.tmp.19.dr, tmpC17.tmp.19.dr, tmpEC02.tmp.19.dr, tmpEE00.tmp.19.dr, tmpD767.tmp.19.dr, tmpD28.tmp.19.dr, tmpEB9A.tmp.19.dr, tmpD733.tmp.19.dr, tmpFBCB.tmp.19.dr, tmpEEBF.tmp.19.dr, tmpDF63.tmp.19.dr, tmp2D0.tmp.19.dr, tmpFEBB.tmp.19.dr, tmpFEEE.tmp.19.dr, tmpEAA5.tmp.19.dr, tmpF2EB.tmp.19.dr, tmpE9A0.tmp.19.dr, tmpF9FA.tmp.19.dr, tmpDD69.tmp.19.dr, tmpC9F2.tmp.19.dr, tmpF0B0.tmp.19.dr, tmpD90C.tmp.19.dr, tmp43D.tmp.19.dr, tmpC8D4.tmp.19.dr, tmp593.tmp.19.dr, tmpC07.tmp.19.dr, tmpF06.tmp.19.dr, tmp43.tmp.19.dr, tmpDADF.tmp.19.dr, tmpCA8B.tmp.19.dr, tmpCC3B.tmp.19.dr, tmp3E7.tmp.19.dr, tmpC918.tmp.19.dr
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip64\Release\sfxzip.pdb source: Celery.exe
            Source: Binary string: RegAsm.pdbI source: RegAsm.exe, 00000013.00000002.2861250304.0000000005139000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5AECA0 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DB5AECA0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59647C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DB59647C
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C30F0 FindFirstFileExA,0_2_00007FF6DB5C30F0
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_0040683D FindFirstFileW,FindClose,1_2_0040683D
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_0040290B FindFirstFileW,1_2_0040290B
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405C13
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

            Networking

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
            Source: unknownDNS traffic detected: query: jVkuFBkAgxQTjEleejFjuecf.jVkuFBkAgxQTjEleejFjuecf replaycode: Name error (3)
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: RegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@|- equals www.youtube.com (Youtube)
            Source: global trafficDNS traffic detected: DNS query: jVkuFBkAgxQTjEleejFjuecf.jVkuFBkAgxQTjEleejFjuecf
            Source: scripts.dllString found in binary or memory: http://%shttp://a.SharedObject.BadPersistenceSharedObject.UriMismatchpendingReserved
            Source: scripts.dllString found in binary or memory: http://ad./adserver/e?type=playererrorhttp://ad.auditude.com/adserver/e?type=playererror//_.dashmpd&
            Source: scripts.dllString found in binary or memory: http://ad./adserver?tm=15&u=&u=&l=&z=&of=1.4&g=Auditude
            Source: scripts.dllString found in binary or memory: http://ad.auditude.com/adserver/e?type=playererror
            Source: scripts.dllString found in binary or memory: http://cdn2.auditude.com/assets/3p/v
            Source: scripts.dllString found in binary or memory: http://cdn2.auditude.com/assets/3p/vService
            Source: Celery V3.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
            Source: Celery V3.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
            Source: RidersString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: RidersString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: Celery V3.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
            Source: Celery V3.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
            Source: RidersString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: Celery V3.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
            Source: Celery V3.exeString found in binary or memory: http://crl.globalsign.com/root.crl0G
            Source: RidersString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: scripts.dllString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
            Source: scripts.dllString found in binary or memory: http://dashif.org/guidelines/trickmode
            Source: scripts.dllString found in binary or memory: http://dashif.org/guidelines/trickmode1
            Source: celeryuwp.binString found in binary or memory: http://docs.rackspacecloud.com/servers/api/v1.0
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: scripts.dllString found in binary or memory: http://fpdownload2.macromedia.com/get/
            Source: scripts.dllString found in binary or memory: http://fpdownload2.macromedia.com/get/flashplayer/update/current/xml/express/version_win_
            Source: scripts.dllString found in binary or memory: http://fpdownload2.macromedia.com/get/flashplayer/update/current/xml/version_
            Source: scripts.dllString found in binary or memory: http://fpdownload2.macromedia.com/get/https://fpdownload.macromedia.com/get/https://www.macromedia.c
            Source: Celery V3.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Celery V3.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
            Source: Celery V3.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
            Source: Celery V3.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
            Source: Celery V3.exeString found in binary or memory: http://ocsp.globalsign.com/rootr103
            Source: Celery V3.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
            Source: scripts.dllString found in binary or memory: http://ocsp.thawte.com0
            Source: RidersString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: RidersString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: Celery V3.exe, RidersString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: Celery V3.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
            Source: scripts.dllString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
            Source: scripts.dllString found in binary or memory: http://s.symcd.com0_
            Source: scripts.dllString found in binary or memory: http://s3.amazonaws.com/venkat-test/ads/camry/file-640k.m3u8
            Source: scripts.dllString found in binary or memory: http://s3.amazonaws.com/venkat-test/ads/camry/file-640k.m3u82L
            Source: scripts.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
            Source: Celery V3.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
            Source: RidersString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: Celery V3.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
            Source: RidersString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: Celery V3.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
            Source: Celery V3.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
            Source: scripts.dllString found in binary or memory: http://sw.symcb.com/sw.crl0
            Source: scripts.dllString found in binary or memory: http://sw.symcd.com0
            Source: scripts.dllString found in binary or memory: http://sw1.symcb.com/sw.crt0
            Source: scripts.dllString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
            Source: scripts.dllString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
            Source: scripts.dllString found in binary or memory: http://ts-ocsp.ws.symantec.com07
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: scripts.dllString found in binary or memory: http://www.macromedia.com
            Source: scripts.dllString found in binary or memory: http://www.macromedia.com/go/player_settings_
            Source: scripts.dllString found in binary or memory: http://www.macromedia.com/go/player_settings_.Unmuted.MutedCamera.UnmutedCamera.MutedMicrophone.Unmu
            Source: scripts.dllString found in binary or memory: http://www.macromedia.comhttps://www.macromedia.com/support/flashplayer/sys/&amp
            Source: scripts.dllString found in binary or memory: http://www.openssl.org/support/faq.html
            Source: scripts.dllString found in binary or memory: http://www.openssl.org/support/faq.html....................
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: RegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
            Source: scripts.dllString found in binary or memory: https://auth.adobefpl.com/1/
            Source: scripts.dllString found in binary or memory: https://d.symcb.com/cps0%
            Source: scripts.dllString found in binary or memory: https://d.symcb.com/rpa0
            Source: scripts.dllString found in binary or memory: https://d.symcb.com/rpa0)
            Source: RegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
            Source: scripts.dllString found in binary or memory: https://fpdownload.macromedia.com/get/
            Source: scripts.dllString found in binary or memory: https://primetimeenablement.sc.omtrdc.net/b/ss//6
            Source: scripts.dllString found in binary or memory: https://primetimeenablement.sc.omtrdc.net/b/ss//6primesample2
            Source: celeryuwp.binString found in binary or memory: https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/decompile.lua
            Source: celeryuwp.binString found in binary or memory: https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/saveinstance.lua
            Source: RidersString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: RidersString found in binary or memory: https://www.globalsign.com/repository/0
            Source: RidersString found in binary or memory: https://www.globalsign.com/repository/06
            Source: scripts.dllString found in binary or memory: https://www.macromedia.com/bin/flashdownload.cgi
            Source: scripts.dllString found in binary or memory: https://www.macromedia.com/support/flashplayer/sys/
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_004056A8
            Source: scripts.dllBinary or memory string: DirectInput8Creatememstr_80216dde-1

            System Summary

            barindex
            Source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\Celery.exeFile dump: Celery V3.exe.0.dr 157301232Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034F7
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5AECA00_2_00007FF6DB5AECA0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59DC080_2_00007FF6DB59DC08
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5A62500_2_00007FF6DB5A6250
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B09980_2_00007FF6DB5B0998
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59A8AC0_2_00007FF6DB59A8AC
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B3FCC0_2_00007FF6DB5B3FCC
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5A56580_2_00007FF6DB5A5658
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5BFCD80_2_00007FF6DB5BFCD8
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C54D00_2_00007FF6DB5C54D0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5972AC0_2_00007FF6DB5972AC
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59B3140_2_00007FF6DB59B314
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C59A00_2_00007FF6DB5C59A0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59B9440_2_00007FF6DB59B944
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B3FCC0_2_00007FF6DB5B3FCC
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5AC9F00_2_00007FF6DB5AC9F0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59E8D80_2_00007FF6DB59E8D8
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5BC0340_2_00007FF6DB5BC034
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C8FC80_2_00007FF6DB5C8FC8
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59BF080_2_00007FF6DB59BF08
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C2EE40_2_00007FF6DB5C2EE4
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5BBDB80_2_00007FF6DB5BBDB8
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_00406BFE1_2_00406BFE
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeCode function: 19_2_026B086819_2_026B0868
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeCode function: 19_2_026B087819_2_026B0878
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeCode function: 19_2_026B4DC019_2_026B4DC0
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeCode function: 19_2_026B4DD019_2_026B4DD0
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
            Source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: classification engineClassification label: mal100.troj.evad.winEXE@27/1065@1/1
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB593BF8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF6DB593BF8
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034F7
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_00404954
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_004021AA CoCreateInstance,1_2_004021AA
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5AC220 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF6DB5AC220
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\ApplicationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5436:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2700:120:WilError_03
            Source: C:\Users\user\Desktop\Celery.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
            Source: Celery.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
            Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
            Source: C:\Users\user\Desktop\Celery.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Celery.exeVirustotal: Detection: 15%
            Source: C:\Users\user\Desktop\Celery.exeFile read: C:\Users\user\Desktop\Celery.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Celery.exe "C:\Users\user\Desktop\Celery.exe"
            Source: C:\Users\user\Desktop\Celery.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe"
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmd
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 1101
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "CalculationsExpediaJumpExchanges" Application
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Trials + Explains + External + Fighting + Get + Rights 1101\z
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif 1101\Spy.pif 1101\z
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Celery.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmdJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 1101Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "CalculationsExpediaJumpExchanges" Application Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Trials + Explains + External + Fighting + Get + Rights 1101\zJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif 1101\Spy.pif 1101\zJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: Celery.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: Celery.exeStatic file information: File size 13919256 > 1048576
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: Celery.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Celery.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000013.00000000.2570090970.0000000000462000.00000002.00000001.01000000.0000000C.sdmp, RegAsm.exe, 00000013.00000002.2864057648.00000000063A0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000013.00000002.2861250304.0000000005139000.00000004.00000020.00020000.00000000.sdmp, tmpF16.tmp.19.dr, tmpCBE8.tmp.19.dr, tmpD3BD.tmp.19.dr, tmpFFAA.tmp.19.dr, tmpD58B.tmp.19.dr, tmpFB00.tmp.19.dr, tmpE0EE.tmp.19.dr, tmpE99F.tmp.19.dr, tmpEF8D.tmp.19.dr, tmpE48.tmp.19.dr, tmpD2FD.tmp.19.dr, tmpCA15.tmp.19.dr, tmpEF3A.tmp.19.dr, tmp6E7.tmp.19.dr, tmpDAF1.tmp.19.dr, tmp41B.tmp.19.dr, tmpE89B.tmp.19.dr, tmpD536.tmp.19.dr, tmpFAA9.tmp.19.dr, tmpF2A9.tmp.19.dr, tmpFAEF.tmp.19.dr, tmp4E6.tmp.19.dr, tmpC82C.tmp.19.dr, tmpDB24.tmp.19.dr, tmpCACF.tmp.19.dr, tmp3F9.tmp.19.dr, tmpC907.tmp.19.dr, tmpF3A9.tmp.19.dr, tmpEEAD.tmp.19.dr, tmp35B.tmp.19.dr, tmpE8BF.tmp.19.dr, tmp169.tmp.19.dr, tmpDFD9.tmp.19.dr, tmpED02.tmp.19.dr, tmpFF53.tmp.19.dr, tmpFEEF.tmp.19.dr, tmpEBAB.tmp.19.dr, tmpD39.tmp.19.dr, tmpC617.tmp.19.dr, tmpD17.tmp.19.dr, tmpD659.tmp.19.dr, tmp54F.tmp.19.dr, tmpCCE6.tmp.19.dr, tmp28B.tmp.19.dr, tmpCCC3.tmp.19.dr, tmpD743.tmp.19.dr, tmpCD3B.tmp.19.dr, tmp739.tmp.19.dr, tmpFF32.tmp.19.dr, tmpFA1C.tmp.19.dr, tmpC67D.tmp.19.dr, tmp681.tmp.19.dr, tmpF123.tmp.19.dr, tmpCB96.tmp.19.dr, tmp122.tmp.19.dr, tmpD79B.tmp.19.dr, tmp4C4.tmp.19.dr, tmp77E.tmp.19.dr, tmpE8D1.tmp.19.dr, tmpE779.tmp.19.dr, tmp247.tmp.19.dr, tmpFADE.tmp.19.dr, tmpE904.tmp.19.dr, tmpC8F6.tmp.19.dr, tmpF262.tmp.19.dr, tmpEF6C.tmp.19.dr, tmp3D5.tmp.19.dr, tmpE811.tmp.19.dr, tmpD435.tmp.19.dr, tmpC84E.tmp.19.dr, tmpDFD8.tmp.19.dr, tmpD412.tmp.19.dr, tmpC86F.tmp.19.dr, tmpFDA9.tmp.19.dr, tmpEC57.tmp.19.dr, tmpE95D.tmp.19.dr, tmpECAA.tmp.19.dr, tmp75A.tmp.19.dr, tmpE9E5.tmp.19.dr, tmpE171.tmp.19.dr, tmpD9AD.tmp.19.dr, tmpEC23.tmp.19.dr, tmp7F4.tmp.19.dr, tmp36D.tmp.19.dr, tmpC629.tmp.19.dr, tmpF962.tmp.19.dr, tmpBD3.tmp.19.dr, tmp3A0.tmp.19.dr, tmpF1EA.tmp.19.dr, tmp51A.tmp.19.dr, tmpEBBC.tmp.19.dr, tmpFF77.tmp.19.dr, tmp76C.tmp.19.dr, tmpD502.tmp.19.dr, tmpDDD0.tmp.19.dr, tmpFA2E.tmp.19.dr, tmpD389.tmp.19.dr, tmpD501.tmp.19.dr, tmpDE25.tmp.19.dr, tmpD5BF.tmp.19.dr, tmpD9CE.tmp.19.dr, tmpD402.tmp.19.dr, tmpEB34.tmp.19.dr, tmpE79D.tmp.19.dr, tmpC17.tmp.19.dr, tmpEC02.tmp.19.dr, tmpEE00.tmp.19.dr, tmpD767.tmp.19.dr, tmpD28.tmp.19.dr, tmpEB9A.tmp.19.dr, tmpD733.tmp.19.dr, tmpFBCB.tmp.19.dr, tmpEEBF.tmp.19.dr, tmpDF63.tmp.19.dr, tmp2D0.tmp.19.dr, tmpFEBB.tmp.19.dr, tmpFEEE.tmp.19.dr, tmpEAA5.tmp.19.dr, tmpF2EB.tmp.19.dr, tmpE9A0.tmp.19.dr, tmpF9FA.tmp.19.dr, tmpDD69.tmp.19.dr, tmpC9F2.tmp.19.dr, tmpF0B0.tmp.19.dr, tmpD90C.tmp.19.dr, tmp43D.tmp.19.dr, tmpC8D4.tmp.19.dr, tmp593.tmp.19.dr, tmpC07.tmp.19.dr, tmpF06.tmp.19.dr, tmp43.tmp.19.dr, tmpDADF.tmp.19.dr, tmpCA8B.tmp.19.dr, tmpCC3B.tmp.19.dr, tmp3E7.tmp.19.dr, tmpC918.tmp.19.dr
            Source: Binary string: Flash.pdb source: scripts.dll
            Source: Binary string: Flash.pdbx source: scripts.dll
            Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000013.00000000.2570090970.0000000000462000.00000002.00000001.01000000.0000000C.sdmp, RegAsm.exe, 00000013.00000002.2864057648.00000000063A0000.00000004.00000020.00020000.00000000.sdmp, tmpF16.tmp.19.dr, tmpCBE8.tmp.19.dr, tmpD3BD.tmp.19.dr, tmpFFAA.tmp.19.dr, tmpD58B.tmp.19.dr, tmpFB00.tmp.19.dr, tmpE0EE.tmp.19.dr, tmpE99F.tmp.19.dr, tmpEF8D.tmp.19.dr, tmpE48.tmp.19.dr, tmpD2FD.tmp.19.dr, tmpCA15.tmp.19.dr, tmpEF3A.tmp.19.dr, tmp6E7.tmp.19.dr, tmpDAF1.tmp.19.dr, tmp41B.tmp.19.dr, tmpE89B.tmp.19.dr, tmpD536.tmp.19.dr, tmpFAA9.tmp.19.dr, tmpF2A9.tmp.19.dr, tmpFAEF.tmp.19.dr, tmp4E6.tmp.19.dr, tmpC82C.tmp.19.dr, tmpDB24.tmp.19.dr, tmpCACF.tmp.19.dr, tmp3F9.tmp.19.dr, tmpC907.tmp.19.dr, tmpF3A9.tmp.19.dr, tmpEEAD.tmp.19.dr, tmp35B.tmp.19.dr, tmpE8BF.tmp.19.dr, tmp169.tmp.19.dr, tmpDFD9.tmp.19.dr, tmpED02.tmp.19.dr, tmpFF53.tmp.19.dr, tmpFEEF.tmp.19.dr, tmpEBAB.tmp.19.dr, tmpD39.tmp.19.dr, tmpC617.tmp.19.dr, tmpD17.tmp.19.dr, tmpD659.tmp.19.dr, tmp54F.tmp.19.dr, tmpCCE6.tmp.19.dr, tmp28B.tmp.19.dr, tmpCCC3.tmp.19.dr, tmpD743.tmp.19.dr, tmpCD3B.tmp.19.dr, tmp739.tmp.19.dr, tmpFF32.tmp.19.dr, tmpFA1C.tmp.19.dr, tmpC67D.tmp.19.dr, tmp681.tmp.19.dr, tmpF123.tmp.19.dr, tmpCB96.tmp.19.dr, tmp122.tmp.19.dr, tmpD79B.tmp.19.dr, tmp4C4.tmp.19.dr, tmp77E.tmp.19.dr, tmpE8D1.tmp.19.dr, tmpE779.tmp.19.dr, tmp247.tmp.19.dr, tmpFADE.tmp.19.dr, tmpE904.tmp.19.dr, tmpC8F6.tmp.19.dr, tmpF262.tmp.19.dr, tmpEF6C.tmp.19.dr, tmp3D5.tmp.19.dr, tmpE811.tmp.19.dr, tmpD435.tmp.19.dr, tmpC84E.tmp.19.dr, tmpDFD8.tmp.19.dr, tmpD412.tmp.19.dr, tmpC86F.tmp.19.dr, tmpFDA9.tmp.19.dr, tmpEC57.tmp.19.dr, tmpE95D.tmp.19.dr, tmpECAA.tmp.19.dr, tmp75A.tmp.19.dr, tmpE9E5.tmp.19.dr, tmpE171.tmp.19.dr, tmpD9AD.tmp.19.dr, tmpEC23.tmp.19.dr, tmp7F4.tmp.19.dr, tmp36D.tmp.19.dr, tmpC629.tmp.19.dr, tmpF962.tmp.19.dr, tmpBD3.tmp.19.dr, tmp3A0.tmp.19.dr, tmpF1EA.tmp.19.dr, tmp51A.tmp.19.dr, tmpEBBC.tmp.19.dr, tmpFF77.tmp.19.dr, tmp76C.tmp.19.dr, tmpD502.tmp.19.dr, tmpDDD0.tmp.19.dr, tmpFA2E.tmp.19.dr, tmpD389.tmp.19.dr, tmpD501.tmp.19.dr, tmpDE25.tmp.19.dr, tmpD5BF.tmp.19.dr, tmpD9CE.tmp.19.dr, tmpD402.tmp.19.dr, tmpEB34.tmp.19.dr, tmpE79D.tmp.19.dr, tmpC17.tmp.19.dr, tmpEC02.tmp.19.dr, tmpEE00.tmp.19.dr, tmpD767.tmp.19.dr, tmpD28.tmp.19.dr, tmpEB9A.tmp.19.dr, tmpD733.tmp.19.dr, tmpFBCB.tmp.19.dr, tmpEEBF.tmp.19.dr, tmpDF63.tmp.19.dr, tmp2D0.tmp.19.dr, tmpFEBB.tmp.19.dr, tmpFEEE.tmp.19.dr, tmpEAA5.tmp.19.dr, tmpF2EB.tmp.19.dr, tmpE9A0.tmp.19.dr, tmpF9FA.tmp.19.dr, tmpDD69.tmp.19.dr, tmpC9F2.tmp.19.dr, tmpF0B0.tmp.19.dr, tmpD90C.tmp.19.dr, tmp43D.tmp.19.dr, tmpC8D4.tmp.19.dr, tmp593.tmp.19.dr, tmpC07.tmp.19.dr, tmpF06.tmp.19.dr, tmp43.tmp.19.dr, tmpDADF.tmp.19.dr, tmpCA8B.tmp.19.dr, tmpCC3B.tmp.19.dr, tmp3E7.tmp.19.dr, tmpC918.tmp.19.dr
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip64\Release\sfxzip.pdb source: Celery.exe
            Source: Binary string: RegAsm.pdbI source: RegAsm.exe, 00000013.00000002.2861250304.0000000005139000.00000004.00000020.00020000.00000000.sdmp
            Source: Celery.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Celery.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Celery.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Celery.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Celery.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\Celery.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_5514250Jump to behavior
            Source: Celery.exeStatic PE information: section name: .didat
            Source: Celery.exeStatic PE information: section name: _RDATA
            Source: scripts.dll.0.drStatic PE information: section name: .rodata

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp847.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF05.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC629.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD53.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEE3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF5A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCF4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1FC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp61C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp67.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEDBC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD388.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD469.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD5D0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA57.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF54.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDEF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3AC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5C0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE79.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD76.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF7D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE14.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC7D7.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFF5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF28.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1D8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEBB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE04C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp693.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBD4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEC0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2FD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD48C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD39.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7F4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE7BF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC65B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE88.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF77.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE37.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE07E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp44.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp64D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF29.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE78C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp815.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE57D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAE5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC605.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp670.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB93.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCC2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE811.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD558.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFAA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE56.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE5B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3CF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE00.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp79F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD17.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC4B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEDBD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF263.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1FB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEE2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1B6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE33.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE7A.tmpJump to dropped file
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE12E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7A0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE66.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF05D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE172.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDA9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp43.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE9D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1D9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCA0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDEE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFA5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFCC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF02A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDEB1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE43.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF174.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE38.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE11.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEDDF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF87.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE79C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6F8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2FE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDAA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF07E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7F3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE8E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA96.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD332.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE57.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2ED.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp671.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6E7.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE150.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF007.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFA9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC604.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp74A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE0EE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF76.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFD8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE78B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDED3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD48D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7C1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD4AF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE746.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDCC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD59E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF08F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp146.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp21.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEDD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF135.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF21F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD343.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD54.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC29.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD459.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDEA0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFDD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD424.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFEB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFB6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD0F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD35.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEEE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0F2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5D0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD4D1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFBA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE22.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE44.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD9C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE833.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD30F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE87.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEAD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD401.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3F0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD58.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5BF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC639.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp77D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE7D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE747.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp89.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCD3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEBF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp63D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD366.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC616.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEDC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp826.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD331.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE45.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE160.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD447.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC81B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFEF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6B6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD06.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFC8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp22.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp145.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF32.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD58C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF006.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1A5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEDEF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE09F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5E2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD502.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF134.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE05C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2DB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF262.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBF6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE856.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDCD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp65E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD36.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp61B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC67D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEEF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC63A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp694.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF39.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFDC.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\scripts\scripts.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD0E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE23.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp66.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp122.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE05D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF16.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD524.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC81A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp739.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE1F2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD389.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF240.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBD3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp77E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3AD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD402.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC59E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC6D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF10.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF53.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFA0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD446.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC07.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD57.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8B8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFE4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDE1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5E3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp101.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF17.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0D1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD367.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD30.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF9F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE5A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBF5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC7F9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp718.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE44.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2DA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE01.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE855.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0F3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC90.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF31.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0B0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD7B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFC2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC8F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC617.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1A4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD58B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCB1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp65F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD49E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3BE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC83C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEA9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC769.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFB2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD56A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF3A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEDCE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC66C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE8B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF09F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE13F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE26.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD88.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp63C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7E2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF284.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7B1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF6C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp55.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDBE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB35.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF43.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDDE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA46.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD569.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp681.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp134.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE03.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF04B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEED1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD47B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD28.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDBA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp858.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1EA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD39A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2C8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF20D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDF63.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD42.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDF93.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp78.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6A5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD547.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE192.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE800.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEF5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD5BF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDF14.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE758.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDE0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE76.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5D1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp75B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE68.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD87.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC3A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE77A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF65.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD344.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE6C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE735.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDEE4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF98.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEAA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF018.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD354.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2EC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp78E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF22F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEAE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1EB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9C6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFEFF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp897.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF6B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD49D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD64.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE8F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFEA.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE7AE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF06D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD321.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp805.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD458.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE00.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFCFE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE8C.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1C8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDEB2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEED0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD4C1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFC7.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6B5.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD05.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDF94.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC69D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD65.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF03B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp682.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF252.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5AE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD501.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp10.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE49.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE22.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF274.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFCED.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp938.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFDBB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFEE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC809.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF1B7.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE9F.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF04C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp156.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD513.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8E8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD378.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD59D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF017.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDAE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE6B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7D2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD18.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp75A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC7E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC3B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF20E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF21.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2C9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCE4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD320.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp76C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFA4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE779.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp977.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD47.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD20.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE736.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp837.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDEC3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE171.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC82C.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE724.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6C7.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE34.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF029.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE821.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFFCB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE55.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE04B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF251.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD536.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE7C0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC17.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD4C0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE845.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD412.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD98.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFD4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD355.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE48.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFECB.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF8D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE21.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE69.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE1B2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE11E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFCEC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE02A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE79D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA16.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDFD9.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD436.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE25.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF123.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEF8E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp33.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3BD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE7EF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE822.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD8B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp112.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD69.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDAD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC628.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD514.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD557.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9F6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp56.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD413.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDD0.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\dll\VMProtectSDK32.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFE99.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE844.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC7E8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp729.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD535.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEE12.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBE4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8C8.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDD6A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFB1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDCF.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0C1.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD57A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBD.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD3DF.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\dll\celeryuwp.binJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC18.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE06E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD435.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD5BE.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD39B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC64B.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEFD3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDDF2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5D.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF0E2.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE759.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmp133.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC5F4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEF4.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD47A.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCC3.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE04.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFD41.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: RegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@|-
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeMemory allocated: 2670000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\dll\VMProtectSDK32.dllJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\scripts\scripts.dllJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\dll\celeryuwp.binJump to dropped file
            Source: C:\Users\user\Desktop\Celery.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5AECA0 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DB5AECA0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59647C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DB59647C
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C30F0 FindFirstFileExA,0_2_00007FF6DB5C30F0
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_0040683D FindFirstFileW,FindClose,1_2_0040683D
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_0040290B FindFirstFileW,1_2_0040290B
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeCode function: 1_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405C13
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B50F4 VirtualQuery,GetSystemInfo,0_2_00007FF6DB5B50F4
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: VMProtectSDK32.dllBinary or memory string: VMProtectSDK32.dllVMProtectActivateLicenseVMProtectBeginVMProtectBeginMutationVMProtectBeginUltraVMProtectBeginUltraLockByKeyVMProtectBeginVirtualizationVMProtectBeginVirtualizationLockByKeyVMProtectDeactivateLicenseVMProtectDecryptStringAVMProtectDecryptStringWVMProtectEndVMProtectFreeStringVMProtectGetCurrentHWIDVMProtectGetOfflineActivationStringVMProtectGetOfflineDeactivationStringVMProtectGetSerialNumberDataVMProtectGetSerialNumberStateVMProtectIsDebuggerPresentVMProtectIsProtectedVMProtectIsValidImageCRCVMProtectIsVirtualMachinePresentVMProtectSetSerialNumber
            Source: VMProtectSDK32.libBinary or memory string: __imp__VMProtectIsVirtualMachinePresent@0
            Source: VMProtectSDK32.libBinary or memory string: VMProtectSDK32_NULL_THUNK_DATA_VMProtectIsProtected@0__imp__VMProtectIsProtected@0_VMProtectBegin@4__imp__VMProtectBegin@4_VMProtectBeginVirtualization@4__imp__VMProtectBeginVirtualization@4_VMProtectBeginMutation@4__imp__VMProtectBeginMutation@4_VMProtectBeginUltra@4__imp__VMProtectBeginUltra@4_VMProtectBeginVirtualizationLockByKey@4__imp__VMProtectBeginVirtualizationLockByKey@4_VMProtectBeginUltraLockByKey@4__imp__VMProtectBeginUltraLockByKey@4_VMProtectEnd@0__imp__VMProtectEnd@0_VMProtectIsDebuggerPresent@4__imp__VMProtectIsDebuggerPresent@4_VMProtectIsVirtualMachinePresent@0__imp__VMProtectIsVirtualMachinePresent@0_VMProtectIsValidImageCRC@0__imp__VMProtectIsValidImageCRC@0_VMProtectDecryptStringA@4__imp__VMProtectDecryptStringA@4_VMProtectDecryptStringW@4__imp__VMProtectDecryptStringW@4_VMProtectFreeString@4__imp__VMProtectFreeString@4_VMProtectSetSerialNumber@4__imp__VMProtectSetSerialNumber@4_VMProtectGetSerialNumberState@0__imp__VMProtectGetSerialNumberState@0_VMProtectGetSerialNumberData@8__imp__VMProtectGetSerialNumberData@8_VMProtectGetCurrentHWID@8__imp__VMProtectGetCurrentHWID@8_VMProtectActivateLicense@12__imp__VMProtectActivateLicense@12_VMProtectDeactivateLicense@4__imp__VMProtectDeactivateLicense@4_VMProtectGetOfflineActivationString@12__imp__VMProtectGetOfflineActivationString@12_VMProtectGetOfflineDeactivationString@12__imp__VMProtectGetOfflineDeactivationString@12/ 1569745864 0 1714 `
            Source: VMProtectSDK32.libBinary or memory string: _VMProtectActivateLicense@12_VMProtectBegin@4_VMProtectBeginMutation@4_VMProtectBeginUltra@4_VMProtectBeginUltraLockByKey@4_VMProtectBeginVirtualization@4_VMProtectBeginVirtualizationLockByKey@4_VMProtectDeactivateLicense@4_VMProtectDecryptStringA@4_VMProtectDecryptStringW@4_VMProtectEnd@0_VMProtectFreeString@4_VMProtectGetCurrentHWID@8_VMProtectGetOfflineActivationString@12_VMProtectGetOfflineDeactivationString@12_VMProtectGetSerialNumberData@8_VMProtectGetSerialNumberState@0_VMProtectIsDebuggerPresent@4_VMProtectIsProtected@0_VMProtectIsValidImageCRC@0_VMProtectIsVirtualMachinePresent@0_VMProtectSetSerialNumber@4__IMPORT_DESCRIPTOR_VMProtectSDK32__NULL_IMPORT_DESCRIPTOR__imp__VMProtectActivateLicense@12__imp__VMProtectBegin@4__imp__VMProtectBeginMutation@4__imp__VMProtectBeginUltra@4__imp__VMProtectBeginUltraLockByKey@4__imp__VMProtectBeginVirtualization@4__imp__VMProtectBeginVirtualizationLockByKey@4__imp__VMProtectDeactivateLicense@4__imp__VMProtectDecryptStringA@4__imp__VMProtectDecryptStringW@4__imp__VMProtectEnd@0__imp__VMProtectFreeString@4__imp__VMProtectGetCurrentHWID@8__imp__VMProtectGetOfflineActivationString@12__imp__VMProtectGetOfflineDeactivationString@12__imp__VMProtectGetSerialNumberData@8__imp__VMProtectGetSerialNumberState@0__imp__VMProtectIsDebuggerPresent@4__imp__VMProtectIsProtected@0__imp__VMProtectIsValidImageCRC@0__imp__VMProtectIsVirtualMachinePresent@0__imp__VMProtectSetSerialNumber@4
            Source: VMProtectSDK32.libBinary or memory string: _VMProtectIsVirtualMachinePresent@0VMProtectSDK32.dll
            Source: RegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@|-
            Source: VMProtectSDK32.dllBinary or memory string: VMProtectIsVirtualMachinePresent
            Source: VMProtectSDK32.libBinary or memory string: _VMProtectIsVirtualMachinePresent@0
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeAPI call chain: ExitProcess graph end nodegraph_1-3664
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5BAC28 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DB5BAC28
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5C4170 GetProcessHeap,0_2_00007FF6DB5C4170
            Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B5CA0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6DB5B5CA0
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5BAC28 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DB5BAC28
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B6AE4 SetUnhandledExceptionFilter,0_2_00007FF6DB5B6AE4
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B6900 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DB5B6900
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe base: 540000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe base: 540000Jump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe base: 78F000Jump to behavior
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5AECA0 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DB5AECA0
            Source: C:\Users\user\Desktop\Celery.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmdJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 1101Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "CalculationsExpediaJumpExchanges" Application Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Trials + Explains + External + Fighting + Get + Rights 1101\zJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif 1101\Spy.pif 1101\zJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeJump to behavior
            Source: SpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB59DB98 cpuid 0_2_00007FF6DB59DB98
            Source: C:\Users\user\Desktop\Celery.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF6DB5ADE04
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\modern.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\roman.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\script.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuil.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\coure.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\courf.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seriff.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\sserife.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\sseriff.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\smalle.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\smallf.fon VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuisl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuil.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB5B3FCC GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DB5B3FCC
            Source: C:\Users\user\Desktop\Celery.exeCode function: 0_2_00007FF6DB596768 GetVersionExW,0_2_00007FF6DB596768
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPE

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 19.2.RegAsm.exe.540000.0.unpack, type: UNPACKEDPE
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Masquerading
            1
            Input Capture
            1
            System Time Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Virtualization/Sandbox Evasion
            LSASS Memory221
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)212
            Process Injection
            1
            Disable or Modify Tools
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Clipboard Data
            1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Access Token Manipulation
            NTDS3
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script212
            Process Injection
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync3
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem38
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432517 Sample: Celery.exe Startdate: 27/04/2024 Architecture: WINDOWS Score: 100 58 jVkuFBkAgxQTjEleejFjuecf.jVkuFBkAgxQTjEleejFjuecf 2->58 70 Malicious sample detected (through community Yara rule) 2->70 72 Multi AV Scanner detection for dropped file 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 5 other signatures 2->76 11 Celery.exe 41 2->11         started        signatures3 process4 file5 50 C:\Users\user\AppData\Local\...\scripts.dll, PE32 11->50 dropped 52 C:\Users\user\AppData\Local\...\celeryuwp.bin, PE32 11->52 dropped 54 C:\Users\user\AppData\...\VMProtectSDK32.dll, PE32 11->54 dropped 56 C:\Users\user\AppData\Local\...\Celery V3.exe, PE32 11->56 dropped 84 Drops large PE files 11->84 15 Celery V3.exe 23 11->15         started        signatures6 process7 process8 17 cmd.exe 2 15->17         started        file9 46 C:\Users\user\AppData\Local\...\Spy.pif, PE32 17->46 dropped 64 Uses ping.exe to sleep 17->64 66 Drops PE files with a suspicious file extension 17->66 68 Uses ping.exe to check the status of other devices and networks 17->68 21 Spy.pif 1 17->21         started        25 PING.EXE 1 17->25         started        28 cmd.exe 2 17->28         started        30 7 other processes 17->30 signatures10 process11 dnsIp12 48 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 21->48 dropped 78 Machine Learning detection for dropped file 21->78 80 Writes to foreign memory regions 21->80 82 Injects a PE file into a foreign processes 21->82 32 RegAsm.exe 1002 21->32         started        60 127.0.0.1 unknown unknown 25->60 file13 signatures14 process15 file16 38 C:\Users\user\AppData\Local\...\tmpFFEF.tmp, PE32 32->38 dropped 40 C:\Users\user\AppData\Local\...\tmpFFEE.tmp, PE32 32->40 dropped 42 C:\Users\user\AppData\Local\...\tmpFFDD.tmp, PE32 32->42 dropped 44 1022 other files (none is malicious) 32->44 dropped 62 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 32->62 36 conhost.exe 32->36         started        signatures17 process18

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Celery.exe15%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe0%ReversingLabs
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif7%ReversingLabs
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif3%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe13%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\RarSFX0\dll\VMProtectSDK32.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\RarSFX0\dll\VMProtectSDK32.dll0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\RarSFX0\dll\celeryuwp.bin0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\RarSFX0\dll\celeryuwp.bin3%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\RarSFX0\scripts\scripts.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\RarSFX0\scripts\scripts.dll0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\tmp1.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\tmp1.tmp0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\tmp10.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\tmp10.tmp0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\tmp101.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\tmp101.tmp0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\tmp112.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\tmp112.tmp0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\tmp122.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\tmp122.tmp0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\tmp133.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\tmp133.tmp0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            https://api.ip.sb/ip0%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            https://primetimeenablement.sc.omtrdc.net/b/ss//6primesample20%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://dashif.org/guidelines/trickmode0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
            http://dashif.org/guidelines/trickmode10%Avira URL Cloudsafe
            http://cdn2.auditude.com/assets/3p/vService0%Avira URL Cloudsafe
            http://www.macromedia.comhttps://www.macromedia.com/support/flashplayer/sys/&amp0%Avira URL Cloudsafe
            https://discord.com/api/v9/users/0%Avira URL Cloudsafe
            http://cdn2.auditude.com/assets/3p/vService0%VirustotalBrowse
            http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
            https://auth.adobefpl.com/1/0%Avira URL Cloudsafe
            https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/saveinstance.lua0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
            http://%shttp://a.SharedObject.BadPersistenceSharedObject.UriMismatchpendingReserved0%Avira URL Cloudsafe
            https://auth.adobefpl.com/1/0%VirustotalBrowse
            https://primetimeenablement.sc.omtrdc.net/b/ss//6primesample20%VirustotalBrowse
            https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/saveinstance.lua1%VirustotalBrowse
            http://www.founder.com.cn/cn0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
            http://ad./adserver/e?type=playererrorhttp://ad.auditude.com/adserver/e?type=playererror//_.dashmpd&0%Avira URL Cloudsafe
            http://dashif.org/guidelines/trickmode10%VirustotalBrowse
            https://primetimeenablement.sc.omtrdc.net/b/ss//60%Avira URL Cloudsafe
            http://ad.auditude.com/adserver/e?type=playererror0%Avira URL Cloudsafe
            http://www.zhongyicts.com.cn1%VirustotalBrowse
            http://ad./adserver?tm=15&u=&u=&l=&z=&of=1.4&g=Auditude0%Avira URL Cloudsafe
            http://cdn2.auditude.com/assets/3p/v0%Avira URL Cloudsafe
            https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/decompile.lua0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn0%VirustotalBrowse
            https://primetimeenablement.sc.omtrdc.net/b/ss//60%VirustotalBrowse
            http://cdn2.auditude.com/assets/3p/v0%VirustotalBrowse
            http://ad.auditude.com/adserver/e?type=playererror0%VirustotalBrowse
            https://discord.com/api/v9/users/0%VirustotalBrowse
            https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/decompile.lua1%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            jVkuFBkAgxQTjEleejFjuecf.jVkuFBkAgxQTjEleejFjuecf
            unknown
            unknownfalse
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.fontbureau.com/designersGRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.macromedia.comscripts.dllfalse
                  high
                  http://www.fontbureau.com/designers/?RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://fpdownload2.macromedia.com/get/flashplayer/update/current/xml/version_scripts.dllfalse
                      high
                      http://www.founder.com.cn/cn/bTheRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.rackspacecloud.com/servers/api/v1.0celeryuwp.binfalse
                        high
                        http://www.fontbureau.com/designers?RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/soap/envelope/scripts.dllfalse
                            high
                            http://www.tiro.comRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://primetimeenablement.sc.omtrdc.net/b/ss//6primesample2scripts.dllfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designersRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.autoitscript.com/autoit3/Ridersfalse
                                high
                                http://s3.amazonaws.com/venkat-test/ads/camry/file-640k.m3u82Lscripts.dllfalse
                                  high
                                  http://www.openssl.org/support/faq.htmlscripts.dllfalse
                                    high
                                    http://www.sajatypeworks.comRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cn/cTheRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://cdn2.auditude.com/assets/3p/vServicescripts.dllfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://s3.amazonaws.com/venkat-test/ads/camry/file-640k.m3u8scripts.dllfalse
                                      high
                                      http://crl.thawte.com/ThawteTimestampingCA.crl0scripts.dllfalse
                                        high
                                        http://www.macromedia.com/go/player_settings_scripts.dllfalse
                                          high
                                          http://dashif.org/guidelines/trickmode1scripts.dllfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.macromedia.comhttps://www.macromedia.com/support/flashplayer/sys/&ampscripts.dllfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://discord.com/api/v9/users/RegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.galapagosdesign.com/DPleaseRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fonts.comRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleaseRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • 1%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.sakkal.comRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.autoitscript.com/autoit3/JSpfalse
                                              high
                                              http://www.apache.org/licenses/LICENSE-2.0RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.comRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.ip.sb/ipRegAsm.exe, 00000013.00000002.2854794727.00000000028B8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://auth.adobefpl.com/1/scripts.dllfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/saveinstance.luaceleryuwp.binfalse
                                                  • 1%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://ocsp.thawte.com0scripts.dllfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://%shttp://a.SharedObject.BadPersistenceSharedObject.UriMismatchpendingReservedscripts.dllfalse
                                                  • Avira URL Cloud: safe
                                                  low
                                                  http://nsis.sf.net/NSIS_ErrorErrorCelery V3.exefalse
                                                    high
                                                    http://www.carterandcone.comlRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/cabarga.htmlNRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.founder.com.cn/cnRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • 0%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers/frere-user.htmlRegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.openssl.org/support/faq.html....................scripts.dllfalse
                                                          high
                                                          http://ad./adserver/e?type=playererrorhttp://ad.auditude.com/adserver/e?type=playererror//_.dashmpd&scripts.dllfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://fpdownload2.macromedia.com/get/scripts.dllfalse
                                                            high
                                                            http://www.jiyu-kobo.co.jp/RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://primetimeenablement.sc.omtrdc.net/b/ss//6scripts.dllfalse
                                                            • 0%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://ad.auditude.com/adserver/e?type=playererrorscripts.dllfalse
                                                            • 0%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://dashif.org/guidelines/trickmodescripts.dllfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.com/designers8RegAsm.exe, 00000013.00000002.2862276175.0000000005DC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.macromedia.com/go/player_settings_.Unmuted.MutedCamera.UnmutedCamera.MutedMicrophone.Unmuscripts.dllfalse
                                                                high
                                                                http://ad./adserver?tm=15&u=&u=&l=&z=&of=1.4&g=Auditudescripts.dllfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.macromedia.com/bin/flashdownload.cgiscripts.dllfalse
                                                                  high
                                                                  https://www.macromedia.com/support/flashplayer/sys/scripts.dllfalse
                                                                    high
                                                                    https://fpdownload.macromedia.com/get/scripts.dllfalse
                                                                      high
                                                                      https://raw.githubusercontent.com/TheSeaweedMonster/Luau/main/decompile.luaceleryuwp.binfalse
                                                                      • 1%, Virustotal, Browse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://cdn2.auditude.com/assets/3p/vscripts.dllfalse
                                                                      • 0%, Virustotal, Browse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://fpdownload2.macromedia.com/get/https://fpdownload.macromedia.com/get/https://www.macromedia.cscripts.dllfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        IP
                                                                        127.0.0.1
                                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                                        Analysis ID:1432517
                                                                        Start date and time:2024-04-27 12:00:12 +02:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 9m 37s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:22
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:Celery.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.evad.winEXE@27/1065@1/1
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:
                                                                        • Successful, ratio: 100%
                                                                        • Number of executed functions: 109
                                                                        • Number of non-executed functions: 93
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size getting too big, too many NtCreateFile calls found.
                                                                        • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                                        • Report size getting too big, too many NtWriteFile calls found.
                                                                        TimeTypeDescription
                                                                        12:01:46API Interceptor673x Sleep call for process: Spy.pif modified
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exeqBSw7aeXEM.exeGet hashmaliciousRedLineBrowse
                                                                          AWB NO. 077-57676135.exeGet hashmaliciousAgentTeslaBrowse
                                                                            z4aHc5RDMN.exeGet hashmaliciousRedLineBrowse
                                                                              hesaphareketi-01.pdf.SCR.exeGet hashmaliciousAgentTeslaBrowse
                                                                                hesaphareketi_1.SCR.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  remasdasd.exeGet hashmaliciousXWormBrowse
                                                                                    9safSk1jJz.exeGet hashmaliciousRedLineBrowse
                                                                                      OZQB66iRBr.exeGet hashmaliciousRisePro StealerBrowse
                                                                                        BXQ4Nv60Rl.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          nq5gQXmhPL.exeGet hashmaliciousRisePro StealerBrowse
                                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pifqBSw7aeXEM.exeGet hashmaliciousRedLineBrowse
                                                                                              file.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                z4aHc5RDMN.exeGet hashmaliciousRedLineBrowse
                                                                                                  file.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                    DisabilityCharge.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                      SA161.pdf.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                        DisabilityCharge.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                          Factura_SA161.pdf.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                            remasdasd.exeGet hashmaliciousXWormBrowse
                                                                                                              SOmgV48NPL.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Joe Sandbox View:
                                                                                                                • Filename: qBSw7aeXEM.exe, Detection: malicious, Browse
                                                                                                                • Filename: AWB NO. 077-57676135.exe, Detection: malicious, Browse
                                                                                                                • Filename: z4aHc5RDMN.exe, Detection: malicious, Browse
                                                                                                                • Filename: hesaphareketi-01.pdf.SCR.exe, Detection: malicious, Browse
                                                                                                                • Filename: hesaphareketi_1.SCR.exe, Detection: malicious, Browse
                                                                                                                • Filename: remasdasd.exe, Detection: malicious, Browse
                                                                                                                • Filename: 9safSk1jJz.exe, Detection: malicious, Browse
                                                                                                                • Filename: OZQB66iRBr.exe, Detection: malicious, Browse
                                                                                                                • Filename: BXQ4Nv60Rl.exe, Detection: malicious, Browse
                                                                                                                • Filename: nq5gQXmhPL.exe, Detection: malicious, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Category:modified
                                                                                                                Size (bytes):893608
                                                                                                                Entropy (8bit):6.620254876639106
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                                                                                MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                                                SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                                                                                SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                                                                                SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                • Antivirus: ReversingLabs, Detection: 7%
                                                                                                                • Antivirus: Virustotal, Detection: 3%, Browse
                                                                                                                Joe Sandbox View:
                                                                                                                • Filename: qBSw7aeXEM.exe, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: z4aHc5RDMN.exe, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: DisabilityCharge.exe, Detection: malicious, Browse
                                                                                                                • Filename: SA161.pdf.lnk, Detection: malicious, Browse
                                                                                                                • Filename: DisabilityCharge.exe, Detection: malicious, Browse
                                                                                                                • Filename: Factura_SA161.pdf.lnk, Detection: malicious, Browse
                                                                                                                • Filename: remasdasd.exe, Detection: malicious, Browse
                                                                                                                • Filename: SOmgV48NPL.exe, Detection: malicious, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):750466
                                                                                                                Entropy (8bit):7.99973966903151
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:12288:tXAy5DBmA+yqbVqYgH1ure4YsxjJbTA0RSvT3/H6nThRoQd8mBiMnMoE0ziigqHO:tXAUDBm3bgYbYWjljy3i/xd85MnbEUij
                                                                                                                MD5:A93D2D4011D95FF33664ED9986FF0EF5
                                                                                                                SHA1:CFBA99860F0678FE292459C18E5AF6CBA2267A5D
                                                                                                                SHA-256:9F063605FE838523E9E2B479902F64E26FAF52EA8545FA923639E2A4A51C9457
                                                                                                                SHA-512:9457DD2488DF9309445123F114917EB2D578469BDED41B26BCBEA32BCCA009070935E1F9265E48A91C03DD25143AF0E01C09D8A15340A3C7F4F693B62E1BF203
                                                                                                                Malicious:false
                                                                                                                Preview:WS..7a.@S.C....M.s...T....5.bL....,.Z/n......p)....?z...cnW+.....o....&.......b..8.9F.([.......o/...Z.q:S.vt.}O...D..U)..W...v...L...b....}...xru.+.....U..J..`...1.g@..2o....oy..W..G....7I..+...@r~.?.vj+._/U..L......p[....f.V.........-q...k..x..!L..W.#F....72zV...;...y.e.8..p.+4......k.l..2..'.../.YK..u..`.[...w..M_.....{#..(f..l.Mhx..~....P....3e..?>......[2...$..\...m....*.K....\.-..Z~..%.2._.A.^..&.C.Z.J}M.>..F.5!.W..s...@e@K.b~].>...bt`...F@g. ....f2&..+...7.C..p.....f_.|O.b. ...|.T._v.X[Sk.I(W...._..a.h..0c.x.c.....#`..e..b....4.....m.x.(.e...d..k.<g...$b..Mi.C.K..(p..f8..r. ....4.L..H........`.k.../.T.|A..FKE...t.1'.6g].$...ET..E...n.S..B=...QP.D..o..0.....^....q.Z..}.@.$....nM....n...k.............I..5...*.<3l...Q4.e&..O.........%..a.>.~..v......&@PN......Jx....F./'..:..-K;q.../....z|.<Ng....Q.dA...~c.....CI...X....$>.gg}E<..J....=l*.. ....).:..;....2..?L........:L.U.?.l\J..4..X..e...&..+....-*..{0.......#..I3.m..?N%.j...gJ...D.W()
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):88
                                                                                                                Entropy (8bit):3.3101885580141697
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:hK/WgdVAvI9ZDS1cUqt/vll:hAWguI9ZG1Hq
                                                                                                                MD5:9A66FA1DD1B4C3DD1AE7C9A4A87AA842
                                                                                                                SHA1:21CF8F84E43F5C3586D99A23986660F499D0177E
                                                                                                                SHA-256:F78B0469AFA7869C255BD94D0DC3D8EAB6BF4D414C3F351057D489A4160C83E6
                                                                                                                SHA-512:378A75B0F42E590FD4100D950B4AA91D86B794C32B3DE71F82426C1E212A351E611956A9E4AF1A38E1FCFE0FA124396B9295871626708EA1E5E5F7FD6E3311D0
                                                                                                                Malicious:false
                                                                                                                Preview:CalculationsExpediaJumpExchanges..MZ......................@.............................
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:ASCII text, with very long lines (1478), with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):28560
                                                                                                                Entropy (8bit):5.037288720155618
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:uVTFUfBv8Jn8hte+dQcbsF5fZtg23bU/F8qeP:EUWJGRdfsvfZ/bOeP
                                                                                                                MD5:357FAAB5CDDB2500C29C7C067E746006
                                                                                                                SHA1:66D41A27C3A0E58E365138146442B9D6DF141A25
                                                                                                                SHA-256:05992ACD6574248821BC4183735FA1C9290F3FB0EA788BC7BA848A80ECD824EF
                                                                                                                SHA-512:19A6890112ACE0B4174B6FCC77D75DBABC5F66A0EA02A068F7DCB2DBE7BE3DE11885C7F459DC5FDDA483F29AE24C6579619DD2AB8BA41E456A2535CF7397471A
                                                                                                                Malicious:false
                                                                                                                Preview:Set Lab=3..sZmhInspired Eligibility Eternal Japanese Temperatures Infected Oil ..CNIITariff Gratis ..EhmOMighty Zimbabwe Department Celebrity Owners ..aztSCustoms Tennessee Weekly Slideshow Definitions Makers ..XDLyGnu ..KFBold Represent Recreational Wrap Keys ..UfFairy ..GhIntent Tion Admit Hydrocodone Fa ..DAexControls Reef Intended Whom Struck ..WlDowntown Final Brush Person Referred Middle Bbs Lonely Cm ..Set Converter=P..flBrochures Furthermore Php Gcc Psp Talented ..KsbNamespace Hub Examine ..gsFlour Deep Brochure Scheduled ..KNQFetish ..PkUBSuccessful Julian Girlfriend Matches Latino Align Potential Pale ..lbYHVirtual Travelers ..VXLonely F Adelaide Vp Ny Teaches Spare Determine Suspect ..kxeInputs Realm Thus Salary Township Explanation ..Set Medicare=Q..ijPpGhost Trails Loans Ent Usual Mitsubishi Eggs Luxembourg ..cWGHundreds Rl ..YrAndrews Respiratory Database Advocacy Laden Zum Organisation Hash April ..SLPub Zoo Superb Villa Accurate Trivia Incomplete Julie ..VhSq Electron C
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:ASCII text, with very long lines (1478), with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):28560
                                                                                                                Entropy (8bit):5.037288720155618
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:uVTFUfBv8Jn8hte+dQcbsF5fZtg23bU/F8qeP:EUWJGRdfsvfZ/bOeP
                                                                                                                MD5:357FAAB5CDDB2500C29C7C067E746006
                                                                                                                SHA1:66D41A27C3A0E58E365138146442B9D6DF141A25
                                                                                                                SHA-256:05992ACD6574248821BC4183735FA1C9290F3FB0EA788BC7BA848A80ECD824EF
                                                                                                                SHA-512:19A6890112ACE0B4174B6FCC77D75DBABC5F66A0EA02A068F7DCB2DBE7BE3DE11885C7F459DC5FDDA483F29AE24C6579619DD2AB8BA41E456A2535CF7397471A
                                                                                                                Malicious:false
                                                                                                                Preview:Set Lab=3..sZmhInspired Eligibility Eternal Japanese Temperatures Infected Oil ..CNIITariff Gratis ..EhmOMighty Zimbabwe Department Celebrity Owners ..aztSCustoms Tennessee Weekly Slideshow Definitions Makers ..XDLyGnu ..KFBold Represent Recreational Wrap Keys ..UfFairy ..GhIntent Tion Admit Hydrocodone Fa ..DAexControls Reef Intended Whom Struck ..WlDowntown Final Brush Person Referred Middle Bbs Lonely Cm ..Set Converter=P..flBrochures Furthermore Php Gcc Psp Talented ..KsbNamespace Hub Examine ..gsFlour Deep Brochure Scheduled ..KNQFetish ..PkUBSuccessful Julian Girlfriend Matches Latino Align Potential Pale ..lbYHVirtual Travelers ..VXLonely F Adelaide Vp Ny Teaches Spare Determine Suspect ..kxeInputs Realm Thus Salary Township Explanation ..Set Medicare=Q..ijPpGhost Trails Loans Ent Usual Mitsubishi Eggs Luxembourg ..cWGHundreds Rl ..YrAndrews Respiratory Database Advocacy Laden Zum Organisation Hash April ..SLPub Zoo Superb Villa Accurate Trivia Incomplete Julie ..VhSq Electron C
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:OpenPGP Public Key
                                                                                                                Category:dropped
                                                                                                                Size (bytes):161792
                                                                                                                Entropy (8bit):7.998920342375214
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:3072:7mpKOyz1U8g2zQ18z2ZnuDNR1iUhWhu3+Ef+bvsMMjJb6KFQqfk2OhhCNJNIZ:7mZy5gH18zdRDnheu3+eEvsMMjJbxFQL
                                                                                                                MD5:CA29FB91D1D317AA36B1AC46BA0174F9
                                                                                                                SHA1:55DA44A68BBD05441FD713A9782C0A312D4BF55F
                                                                                                                SHA-256:782A12DFF590C537216783E384583C7E6C70E73D6EF50969F7FA77A933F58C71
                                                                                                                SHA-512:98C42A5637A49181C411D0542D5DBBA6F8CE63346CE4A55C59293948F567968FB2C54FA08B9C2ABA89316F314EB75D09B356BB7691005F9243C83827A214606E
                                                                                                                Malicious:false
                                                                                                                Preview:.....D.L..].b6\.~.~.5..=..\.*...a..]..eQ...Y..^.z.|..g.&?.\z..9...C....9KC}.....d...].X.#.sn......(|.tu.+.`...S.y3....X'\,.n.....f.8..N.y...W.U..#,y...d...uu.L......Y.e..pp....5.#.Lf.-6)5.9.7....44.\.p..b..u....R...XK..Vj....f".:...#E..eAm{.....iV;}O...L&?....f^...7Z..o.9...z...3U.Y.......Gn.PR...&.%M.....E....6.....J.0....n..T..lg=..v+c...%T..;..f./...*....V5..#....x@.?..n..A5...8...(.3.:.....:N..P.|.....%[.c.#.1i.*s..4...+.gN..r.A.....N..$g:....l.9....Aa...:..t-.u..G.Y.FP...._....+..........~.....%.Uo.U....H..l.....L.......j...........BI]...JYl..-S7...K..[..0...f.56....... ..Uz>........d%p"W}..d..z...c..W.s.).F.....$....u..<.G....$.X@.!.'...u.D.`.5`.4..8..l.nRr..... ..6]...3A.w.`f...}@.......J>yW'<...~{....0....n.R[5...2...G...f.iM.`...ld64?...#H...n...c. I...xE...4w... ].....3.........$.B5...!....H...D[0.N. ..p.3.=L.!".....k...X...Y...u{.3}..]M.2..@.E.#.#....ixDJMgxeZ...j...B..&..*..]T...$....Z..M.U.>.7P...WO_M...<..K.......N+../...86
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):203776
                                                                                                                Entropy (8bit):7.999087777978891
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:6144:gOkSvT3wiZ96FvxWyz/GyRNm2BQTrcd8mH:gRSvT3/H6nThRoQd8mH
                                                                                                                MD5:BF7FD01409B89941F428ABFCCE10B4CA
                                                                                                                SHA1:42492300B92C2A85B64CFB94165F0A2938DD25C3
                                                                                                                SHA-256:3623CA1E5389B1D853439F536FA926C16B2513192906931DE5EB35725F3F477B
                                                                                                                SHA-512:365E767A2EEDC4937BBB7909BB980E299310C433E1C3739173563FDCDE2632FA21391D8529988BFDFF628DF3152D4872DEED8D24EAF6A904D0C3F2F53519C74A
                                                                                                                Malicious:false
                                                                                                                Preview:qO..;9x......R..]...=.@.../+..Wb).=..Pa....z.e.A..!H..M..B{.._.....7.^2...@..."/A.....o8[T.\P...&...{.m2..,dh I..C...7.uYU|.8....G.6.g...+.i....c^...i..C[..[.q.:y.zQ.^.G.9.?.....AO..,q....y.*+..!......R...L}...~9.l..J.........q+7w...x..a.8.(.--.....!.....@..".?.{wL...c".._......)@'M..@...!u...Bq....Q....E..U~.J..ua.);K.....6j...H..>...>..M.....y=W4=d.Y..5.+...,.R.~..6z.W.....'.p.I.....?...........`.< :...&.w...#r.1f....B....S..n..s'4#<x.k_.#|...L...W...x..YMDI.=..!C.......X....{I..t..Q...?...~......YJ.x.....`....;).-\...b..@....i.....@*..([..{0....i..y-.,. R..0).OV+.}.&..h:.CX..U.`.....[....D.i....I.9.v.c......Gg>..(.h.............{}.I.q.fh._-z.BV:..? ..*F..+.v?...:.H.ZW.65..0.a..G.5>/.P{..\....Rt;{C|..#..a..A..w,.H.....*S.........n#5...}..4...P....H^88...[....>.....wxm^#+P..J3.=...I+..Wt.jt.\.5p......o.W7.rJ<..N....u'L|C8\>.U'].......u4E...~zm..q...y.\..!;<A...+.....Z.^..g..2;....V.1-...dm:St."..L..o.......6..,.6m[..C..e6.A...woX
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):188416
                                                                                                                Entropy (8bit):6.499787367146845
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3072:ZCV26MqgQTc5F446iYNpK5SB7BJBzLZDKJtIs8di/3:Zi2VWTyFsJ8gNJBnGtIC
                                                                                                                MD5:CD2D5D07602E244AE1546D1961088062
                                                                                                                SHA1:32B9D3518E2889D38914E8848F2896F9DAAE4256
                                                                                                                SHA-256:2C4C09C99469B54615DCFD2A748D0E5E7697F0A943FDAD8CAE5CC054E1270551
                                                                                                                SHA-512:1A1B3CCB9CEF636310B8D2A1EABC670DA291683EFA1FDE63EC7F3E7417C3C44F4E808F794EACD9487DE7342C9B7AF346BE5C1D9CCF88BAD0D07043452C419143
                                                                                                                Malicious:false
                                                                                                                Preview:..................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................................................................................................DaL.....h..C..\...Y...L..h..
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):152576
                                                                                                                Entropy (8bit):7.998692969323915
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:3072:ouwkRgYTcMBcCynVXJVrlVI+fgr70ttuNZiVWv8pDed/X:huYTcMiCyNJfVI2grQDYziDeh
                                                                                                                MD5:B2DD53268D83BAA953D96D39A8875882
                                                                                                                SHA1:5320800AE2E0CF728D3B4739FB1258C8B729631C
                                                                                                                SHA-256:BA5CE916A346A64728607A8E4EF74C421E68D309C0F2E1D44F23DE74BA60314D
                                                                                                                SHA-512:78A6A0BEEA0B0A443762797AB153F4B00F14F525581ADD1CA25FA502B243059A83E732C5540087D8EBFC1FF2F26081D7A309C276EBE5A30F7158E4012A6759FB
                                                                                                                Malicious:false
                                                                                                                Preview:...~.iQ...Z.....p{....8...6...r.;.e....i.HXa.dC....k.-1.h..q5..}I.B4.0..b^.S...|@.jq.Zy.S..L...-AGe..#...!.y.._...!\...|.M0.`.....u...2 ..0.....{.cU..V...Qd...1..L.....c..]Z...F..w..K.......;...0.OS...S.Ym..H..b\v..Vh..|....-.t.....K_&......C..?.q.j.....Lt\..o.....x...2.^.....l.y)/.G5,.........Z.....i^.4....|.1%..hri.).m.;f....'...Z.q.M...[.%.$T.;.[K..._..9:...../Y.......}.....}.^.~..Tq.,...eYW..i....[^...X..v..e...H_.F..9......X.5....ES....C..8..S.g...Y.......f}..q.D.B....:X.%...&g6Hn.%.=..T.;...f.............>;.!..-./...a..A.H.qo..#.X...+_...-.......W.q..'.otouj.....B.k,z=.3.l....w..W.O...Cv..l?Lu.!hk..U..zw......dg8S7}}.....c.9`.=v~+.>(..sPxY...3.+7.^...zh...FzZ....=.{...........~...p....Y:..5~.';.T1.....|*......c..N*x...z.8./..C...0.p.My}.Q.........<.br...g. .[..........h..2...`J..m...a....e....(.*5..<V.0..t..GLi....,'{..:f.g.4.-D......WX.#.....;3}........fE$R..3.....'qA.....:..`.-..u..$G......h....s..z.3......!.z...B.D;NtD...w.,.u... iR
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):27648
                                                                                                                Entropy (8bit):7.993100424457694
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:768:Dfae7KDbScEMkoqvGIqDnYKWcWfPZdpMUaCp:Df/ODeloqv0LYdZdpX7
                                                                                                                MD5:5BCC56E4241E8341737B9599F82AAFCC
                                                                                                                SHA1:F46BAEE6528A63E2C77BA9FCD65F3AD1AD929FD1
                                                                                                                SHA-256:9117405E9A295EFAF60C2CD1E9BD3F30C25C5B8B1FE4C7461CFF53596DDCBC1D
                                                                                                                SHA-512:835E360297D9786DBA9EE55A61F9BF912E95B05C3D07FB868483F1DE54575634C1FAFDD284999DAFCE1BCD6FB6B1E788EACFC07071F1C06E8758FC05468E9FFC
                                                                                                                Malicious:false
                                                                                                                Preview:....6......`...r.z.s$.[7.A.....)6..kk.U......./.!.......G.R0o...b....e.7..6.....3...I+..og..c#...............~.%..p..i.=P.b4...YLp........r.s...T.......C.....c0W....mz.c.?y.^......k...k........w.2%l..;..*...0.^~ZK...g.1H....B{.9'.Bb.<..*.........q.~=.}p.#I.2.B..G....S.A... euu........D...mT..0fme9.P.S....X%...".....9-.!.F+i.....].....w),.U..g9.T.Sm..t.REF.V.Wu<|.>9s.......hJ....m^Z.._ejhk.#.K..).<.E.....%.7..B..`}p..p..m.C/!..WH..4......(..1.6.v.....IVoNg..%.....|..YQ.o.9-..5..,....I.L..oV}gW...A7LBb1.\i.U[,.._..\..O..H......V*.I.$.q.6....6......FPuv.&.v......._}..Lz....ghU9/....q.Y.......].(.O..hHU....q+......q.'w....Q.H..f.....v....}?6m#..*S0.k.I..4......2.....]...G.1qF..v"........8t.......Wx.J..t...T.....T.c.p...8...(w....u]&`..K^...Y..Fnw...B...15...6.1Z>...#...dq.#...X.i....A.Vc.NOT..J..+..Y..R.D..Hp..=..;.]L?..C...E..Y5..m...u.V...N.:....}[.w..O.$..,.k="u...C...h.g.{&g..'.e.QW.U+!.b.w......5...G......c|.a....H.;........lTH..
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):297984
                                                                                                                Entropy (8bit):6.46232283283167
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:WcaG9b2M8JTDD/xcq21R1p/rAOPOei7TdFT:WcN9b2MyZa31troPTdFT
                                                                                                                MD5:FBC9947EB416771F0033633639CD8829
                                                                                                                SHA1:6B50FB814906FC6CE6A57687001909E1860E65AB
                                                                                                                SHA-256:AD5AFC43908BE11DBE82E7CE4868861110DC18DBD11D209F352AC79C3208FC78
                                                                                                                SHA-512:D619A2153CE26EA49CA14E54743A986454F7BE37323ACD667930BCBDA02C2F23261261B10C062A52EA9344FCB960F3C4633A83F060C5A05BE09E02EBAEFF5095
                                                                                                                Malicious:false
                                                                                                                Preview:......&..F.....3.^]...U..E.Vj...@..0.E.P.P?....u..u....K....&..F......N......W.}.......8.u..H...t.Q.i......p.....I..............t.Q.J............_. .3.^]...U......4SVW.}.3.\$............G..H..+.....t..D$...G..H...............L$...T...L$ ..T...G..p.........N..D$ SSP.T$...C......D$ .L$.P.Z..9\$.tL.L$......u?.t$..L$4.\...L$0.....L$0......_....].t.........#..C........]....p....L$ ..u...^...L$...^...Y..^...L$...^.....]..G..p....D....E..~..@..0...2....N...j..t$...~..YY..u.......#..C....._^3.[..]...U..QS.].VW.E...{..v..C..H........u..E..C..0.......F....x......C.tC.p.......F..8.C..0......u..F.W.0.....u...........F......>.....0...p....F..8.C..p....^....F.j.W.0....I..}............G......7.(.....ul..<.I.=....u_.}..tY.C..p.........F..0....I..C..0........F..8.C..p........F.j.W.0....I..}......V....G......7_^3.[..]...U......4.E.SVW.X.3..@..\$..p.......N..T$ ...D$ .A..D$$.A..D$(.A...D$,...B...t$$.L$ j.j.j.j.j.h@.K...9..;.u.h@.K..L$$..Y..j...X.I..D$.Ph.;I.j.j.h<=I...\.I..
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):70258
                                                                                                                Entropy (8bit):7.101351350600179
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:zDP8WBosd0bHazf0Tye4Ur2+9BSCVoyO15DuOKHnrxbxZiUCu2iPaLTQ7Q1tCwqZ:kWyu0uZo2+9BBVgCOa1ZBPaPQaEwo0yv
                                                                                                                MD5:36F82EA9FB06ED60524914F858622B8E
                                                                                                                SHA1:135CA9B730DAEB73D53F607F09EDD80D4F59057F
                                                                                                                SHA-256:4E6FF0796FC2EFFDCD62D372B482D147615CDD21877BD1A8C50CB649A879D6EE
                                                                                                                SHA-512:C5F1540916970AD22B308F101E1C461681251FA6AE9DF0E7F2141EEF8555FEB9FCCCCBF8FC34C4E2609C7653A3DBB64A055AE199A1F4689DE8CF1F7B32E069CC
                                                                                                                Malicious:false
                                                                                                                Preview:.a....a..eYV<......@..._U...........6...%...jADV...L.......$@TD..Q.).9........l......S.i..L&.t.G..avv....zj.......nozO..y..WT.E.b.T....x..#...f..a.......a.9.6..8.U.vj.%...m....D.{4....|o..P....3. ...|W......~CD......-..x..v{.....~..8..Z..=...%.e......*PN$.^..#.{.../.....q.f.......4....._....R....d.8.G...)m.\^^.,.|\D....'..W..T..i..D"..ax.....B..m..j..c..`..d..nR-?.+.a.c.h...<.."..Ej..O..j;....Z..q.MU...<...=.........1....v...*.:.....y<...#..g.>.0.m.\U.AD...kx.>(..U..c........G.[..MUMR-..........56T.K"..E.[...Nu.....MU.....GEd....C.6p..kU.........l....!.?.|.j.N.[.......YU}>.H\....1;;..........k...9....O...l.f.-K..|>c..?...B.C.K.y..X.yU./.a.E,..........W.=.i.:........|..a...\.D"%.....l.UD>.|.x.[... ^..?Q./l...!......0~....2.C.Y.(..Q.l..R.l,[)Wll...\......}.....R.i.>..4..i........m.<.U...|..H.{...(..-.m.P....Ts..4J....2..%V.K...YY/.]..Vbu.D.R5..eS.m..*..*...Ak. 5.7.!.3...70...i.3..... .. ........DB~".....E......m.~#.L.{............(..T.Y/V
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4994
                                                                                                                Entropy (8bit):7.961428495984065
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:96:SacWhFhE1uf2EIM503BtM8IB5b62aysIFrxTlUzMiRRozQfKA2fwCBe1:SaFhFse0bM8IvsIXTlUxRefwCBe1
                                                                                                                MD5:D1888072161954D16A445153EC6040A9
                                                                                                                SHA1:FC1759DA68B6CDF9EB9B1D6F8815B7EA1DF879DA
                                                                                                                SHA-256:0EC2E259A47F7CF1817124D110A4FD57BE75E21DE31790019250CA661A7CC434
                                                                                                                SHA-512:65A0B67B9FAE883FC722076D69025D3AA508A8D74B056A0D2384E32963080BE63C60EE4DBFC5BBD632C5A9CD394AEDAD0DE9043F50962C1E0CE95A93994D3BC1
                                                                                                                Malicious:false
                                                                                                                Preview:.5..!......4PU=...e.-;......J..."9a...Tx....H......n.G?.....D.....j{..mTj.eA..<.h...c.f..EGn.K.WD...y..GRW.'...,.!........0..HW...:....(v...`.)`k...e?&.".g._.u..B..v..].....7.9....<}R"._}Q.8c_...xN.o.~H.?.......0..C.(..>...N-...y...sJ8.....9.z.l.D%S|.o.liJA..7'g.X.......X.*.S.(...8.#..v.(..S.p..<....-%1e.....t..e-....1...11....%R...H^.d=..,B..+n.^....y!.>J..ZK3....g#.P..2b.y0.N.].U........M.V..:.....Y.60..".o_~...b}2u.Hgs...`X..g>R|.....!i.J.MHw..[...@.c.q ....6..K............8..G.....^......+..Je.......p..,.C...O..5^.D.. ..q..%.!.%.9c......R-...Z`......Ob..z....%O.o.(I.$O..\1......X5Ff.%...R.]....]....xK....y.......2.U."..P.V."...=w/..Pm.0.b..8.T<..l6dU........9..F6.......(........tT....4~Z..6.zV..c...._....I8j*.wy...~^......C.z]W*9...Yg...Z.......<A.........m..g.Go...A:.df.,J\......x3Ti.8|.....[q4.R......6..5....i....N...U..V.........L.+.u.zJ...3_8.......Z..[.h....vI.QDG.K#N.|!........N.`....K.u...........g..'Q..*..Z...@.
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):249856
                                                                                                                Entropy (8bit):6.735541193172345
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:AsegA/12vk6AQzyMfA+eyVPlcBgtoTqnvAk:AsegA/hMyyzlcqikvAk
                                                                                                                MD5:595C05AA784B35E2495FD55FEEAF9AC3
                                                                                                                SHA1:E1A4CA1271D6036FC201852522905537CAFE0C16
                                                                                                                SHA-256:30D423D8754143F56E19B2D611FCD579D2D2FB0A3B8678734BA33BC6ED28CA0B
                                                                                                                SHA-512:7A86795FC90E182CD5973A825F586B1C8C42756D0FBA66214A9AF25424EAB1D641FCE8A7AA7A1FC2CE50E0F39FC05DEC23858DD9AAC26748609753443212F13D
                                                                                                                Malicious:false
                                                                                                                Preview: t...@t...G.....G.....@t..G........O.....@t.;...|.;.s........................u...........y.3.B................;.~......u........u..J..............t=.......RPWQ.....0................9~...............N.............E.+.F............t6..t..>0t-N........0.!..u..5..L.....I.8.t.@..u.+.....................@t5......t......-.....t......+.....t...... ...............+...........+....u.......P......Wj ..........................Q......P......P...........t....u.......P......Wj0....................t}..~y..H............Pj..E.....P......P........u?9.....t7............P.......E.......P.t....................u..(..........#............Q......PV.:..............x#...t.......P......Wj ......................t.P.@..3.Y................................................._^[t........ap..M.3........].....................B...B...B.*.B.x.B...B...B...B.U..U..B.@t..z..t/.J.x....M...........E.R...P....YY...u..E....].E...].U..V.u...~.W.}.W.u.N.u.........?.t....._^].U..V.u.W.}....E..G.@t.....u..M..
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):87040
                                                                                                                Entropy (8bit):4.18192877457095
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:V+AGWBA60iPTcf4qSq25N8EH/i6mxyyM0Dj2Bmgari07LULTN3Efr8qQ:V+l6JPTcUNx6/xhgariwYLTN3Efrc
                                                                                                                MD5:1BAF48ABD8F03670E93A0661DE886959
                                                                                                                SHA1:7C24E3C81A0322E83011C09CC17525E1DFDB6B2C
                                                                                                                SHA-256:3EB6327A36A819AC3F137D35F92A15BE94DA1B6E5DF3BF57D6FD197EF8969A1E
                                                                                                                SHA-512:260AB7DC6989031F791CC40007A9E2179CD624560E38E23A910223EE18DEB4E83F9F72555901F0E96158E956FA0124FD233D897FA333068FA74F7BAFFAFAC41E
                                                                                                                Malicious:false
                                                                                                                Preview:_______________________________________.________________________________._...............................................................................................................................____.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):199680
                                                                                                                Entropy (8bit):7.99920207739452
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:6144:mj2XEWFo7mf3VnH/SfCvX+ir9IPBml+MhvVIbp:tXAy5DBmA+yqbp
                                                                                                                MD5:F463DED2FF01C0A48BC2A7AEE85E1C6E
                                                                                                                SHA1:EA7B00B13248DC3C5A944C28713BF1D8DD70189C
                                                                                                                SHA-256:46C29BFE671B94D549A3F214F474843224707DA3B6A46AEC61E14F8FAE05BF9E
                                                                                                                SHA-512:9693345117105079641E538C8624BB8DE5C04516EA3ECC3E43595AD84A1F99968182524C263F33522DAF78EC5DA3AB37E29080F15391C4E45A98168C68C6028D
                                                                                                                Malicious:false
                                                                                                                Preview:WS..7a.@S.C....M.s...T....5.bL....,.Z/n......p)....?z...cnW+.....o....&.......b..8.9F.([.......o/...Z.q:S.vt.}O...D..U)..W...v...L...b....}...xru.+.....U..J..`...1.g@..2o....oy..W..G....7I..+...@r~.?.vj+._/U..L......p[....f.V.........-q...k..x..!L..W.#F....72zV...;...y.e.8..p.+4......k.l..2..'.../.YK..u..`.[...w..M_.....{#..(f..l.Mhx..~....P....3e..?>......[2...$..\...m....*.K....\.-..Z~..%.2._.A.^..&.C.Z.J}M.>..F.5!.W..s...@e@K.b~].>...bt`...F@g. ....f2&..+...7.C..p.....f_.|O.b. ...|.T._v.X[Sk.I(W...._..a.h..0c.x.c.....#`..e..b....4.....m.x.(.e...d..k.<g...$b..Mi.C.K..(p..f8..r. ....4.L..H........`.k.../.T.|A..FKE...t.1'.6g].$...ET..E...n.S..B=...QP.D..o..0.....^....q.Z..}.@.$....nM....n...k.............I..5...*.<3l...Q4.e&..O.........%..a.>.~..v......&@PN......Jx....F./'..:..-K;q.../....z|.<Ng....Q.dA...~c.....CI...X....$>.gg}E<..J....=l*.. ....).:..;....2..?L........:L.U.?.l\J..4..X..e...&..+....-*..{0.......#..I3.m..?N%.j...gJ...D.W()
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                Category:dropped
                                                                                                                Size (bytes):157301232
                                                                                                                Entropy (8bit):0.12644263202808903
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24576:9NkQG2LDAjjh8KrrQD5vyII4fBVYT6EnSMrefVy7:7ard9re6IvfbgF177
                                                                                                                MD5:06E7DDAE83EEE00448A508F9BADAB598
                                                                                                                SHA1:C6CEC77B57BC0347A1D6630241312B28A55BA87F
                                                                                                                SHA-256:B26315F2003B6B636B74C6AAC13FEFF2B98B465D8DC9E00B5EB239A46538AE98
                                                                                                                SHA-512:218C1291211A0B50D38F048355169E9DF6FDCC2E8D44E74382B19295613D107E1D2649524D0B3F383B1284C243456C61492F4EC8A1311132B9B6A5047D088934
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Virustotal, Detection: 13%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L....Oa.................f...*.......4............@.......................................@...........................................................`..9...........................................................................................text....e.......f.................. ..`.rdata...............j..............@..@.data...8............~..............@....ndata...................................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):88
                                                                                                                Entropy (8bit):3.3101885580141697
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:hK/WgdVAvI9ZDS1cUqt/vll:hAWguI9ZG1Hq
                                                                                                                MD5:9A66FA1DD1B4C3DD1AE7C9A4A87AA842
                                                                                                                SHA1:21CF8F84E43F5C3586D99A23986660F499D0177E
                                                                                                                SHA-256:F78B0469AFA7869C255BD94D0DC3D8EAB6BF4D414C3F351057D489A4160C83E6
                                                                                                                SHA-512:378A75B0F42E590FD4100D950B4AA91D86B794C32B3DE71F82426C1E212A351E611956A9E4AF1A38E1FCFE0FA124396B9295871626708EA1E5E5F7FD6E3311D0
                                                                                                                Malicious:false
                                                                                                                Preview:CalculationsExpediaJumpExchanges..MZ......................@.............................
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:ASCII text, with very long lines (1478), with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):28560
                                                                                                                Entropy (8bit):5.037288720155618
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:uVTFUfBv8Jn8hte+dQcbsF5fZtg23bU/F8qeP:EUWJGRdfsvfZ/bOeP
                                                                                                                MD5:357FAAB5CDDB2500C29C7C067E746006
                                                                                                                SHA1:66D41A27C3A0E58E365138146442B9D6DF141A25
                                                                                                                SHA-256:05992ACD6574248821BC4183735FA1C9290F3FB0EA788BC7BA848A80ECD824EF
                                                                                                                SHA-512:19A6890112ACE0B4174B6FCC77D75DBABC5F66A0EA02A068F7DCB2DBE7BE3DE11885C7F459DC5FDDA483F29AE24C6579619DD2AB8BA41E456A2535CF7397471A
                                                                                                                Malicious:false
                                                                                                                Preview:Set Lab=3..sZmhInspired Eligibility Eternal Japanese Temperatures Infected Oil ..CNIITariff Gratis ..EhmOMighty Zimbabwe Department Celebrity Owners ..aztSCustoms Tennessee Weekly Slideshow Definitions Makers ..XDLyGnu ..KFBold Represent Recreational Wrap Keys ..UfFairy ..GhIntent Tion Admit Hydrocodone Fa ..DAexControls Reef Intended Whom Struck ..WlDowntown Final Brush Person Referred Middle Bbs Lonely Cm ..Set Converter=P..flBrochures Furthermore Php Gcc Psp Talented ..KsbNamespace Hub Examine ..gsFlour Deep Brochure Scheduled ..KNQFetish ..PkUBSuccessful Julian Girlfriend Matches Latino Align Potential Pale ..lbYHVirtual Travelers ..VXLonely F Adelaide Vp Ny Teaches Spare Determine Suspect ..kxeInputs Realm Thus Salary Township Explanation ..Set Medicare=Q..ijPpGhost Trails Loans Ent Usual Mitsubishi Eggs Luxembourg ..cWGHundreds Rl ..YrAndrews Respiratory Database Advocacy Laden Zum Organisation Hash April ..SLPub Zoo Superb Villa Accurate Trivia Incomplete Julie ..VhSq Electron C
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:OpenPGP Public Key
                                                                                                                Category:dropped
                                                                                                                Size (bytes):161792
                                                                                                                Entropy (8bit):7.998920342375214
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:3072:7mpKOyz1U8g2zQ18z2ZnuDNR1iUhWhu3+Ef+bvsMMjJb6KFQqfk2OhhCNJNIZ:7mZy5gH18zdRDnheu3+eEvsMMjJbxFQL
                                                                                                                MD5:CA29FB91D1D317AA36B1AC46BA0174F9
                                                                                                                SHA1:55DA44A68BBD05441FD713A9782C0A312D4BF55F
                                                                                                                SHA-256:782A12DFF590C537216783E384583C7E6C70E73D6EF50969F7FA77A933F58C71
                                                                                                                SHA-512:98C42A5637A49181C411D0542D5DBBA6F8CE63346CE4A55C59293948F567968FB2C54FA08B9C2ABA89316F314EB75D09B356BB7691005F9243C83827A214606E
                                                                                                                Malicious:false
                                                                                                                Preview:.....D.L..].b6\.~.~.5..=..\.*...a..]..eQ...Y..^.z.|..g.&?.\z..9...C....9KC}.....d...].X.#.sn......(|.tu.+.`...S.y3....X'\,.n.....f.8..N.y...W.U..#,y...d...uu.L......Y.e..pp....5.#.Lf.-6)5.9.7....44.\.p..b..u....R...XK..Vj....f".:...#E..eAm{.....iV;}O...L&?....f^...7Z..o.9...z...3U.Y.......Gn.PR...&.%M.....E....6.....J.0....n..T..lg=..v+c...%T..;..f./...*....V5..#....x@.?..n..A5...8...(.3.:.....:N..P.|.....%[.c.#.1i.*s..4...+.gN..r.A.....N..$g:....l.9....Aa...:..t-.u..G.Y.FP...._....+..........~.....%.Uo.U....H..l.....L.......j...........BI]...JYl..-S7...K..[..0...f.56....... ..Uz>........d%p"W}..d..z...c..W.s.).F.....$....u..<.G....$.X@.!.'...u.D.`.5`.4..8..l.nRr..... ..6]...3A.w.`f...}@.......J>yW'<...~{....0....n.R[5...2...G...f.iM.`...ld64?...#H...n...c. I...xE...4w... ].....3.........$.B5...!....H...D[0.N. ..p.3.=L.!".....k...X...Y...u{.3}..]M.2..@.E.#.#....ixDJMgxeZ...j...B..&..*..]T...$....Z..M.U.>.7P...WO_M...<..K.......N+../...86
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):203776
                                                                                                                Entropy (8bit):7.999087777978891
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:6144:gOkSvT3wiZ96FvxWyz/GyRNm2BQTrcd8mH:gRSvT3/H6nThRoQd8mH
                                                                                                                MD5:BF7FD01409B89941F428ABFCCE10B4CA
                                                                                                                SHA1:42492300B92C2A85B64CFB94165F0A2938DD25C3
                                                                                                                SHA-256:3623CA1E5389B1D853439F536FA926C16B2513192906931DE5EB35725F3F477B
                                                                                                                SHA-512:365E767A2EEDC4937BBB7909BB980E299310C433E1C3739173563FDCDE2632FA21391D8529988BFDFF628DF3152D4872DEED8D24EAF6A904D0C3F2F53519C74A
                                                                                                                Malicious:false
                                                                                                                Preview:qO..;9x......R..]...=.@.../+..Wb).=..Pa....z.e.A..!H..M..B{.._.....7.^2...@..."/A.....o8[T.\P...&...{.m2..,dh I..C...7.uYU|.8....G.6.g...+.i....c^...i..C[..[.q.:y.zQ.^.G.9.?.....AO..,q....y.*+..!......R...L}...~9.l..J.........q+7w...x..a.8.(.--.....!.....@..".?.{wL...c".._......)@'M..@...!u...Bq....Q....E..U~.J..ua.);K.....6j...H..>...>..M.....y=W4=d.Y..5.+...,.R.~..6z.W.....'.p.I.....?...........`.< :...&.w...#r.1f....B....S..n..s'4#<x.k_.#|...L...W...x..YMDI.=..!C.......X....{I..t..Q...?...~......YJ.x.....`....;).-\...b..@....i.....@*..([..{0....i..y-.,. R..0).OV+.}.&..h:.CX..U.`.....[....D.i....I.9.v.c......Gg>..(.h.............{}.I.q.fh._-z.BV:..? ..*F..+.v?...:.H.ZW.65..0.a..G.5>/.P{..\....Rt;{C|..#..a..A..w,.H.....*S.........n#5...}..4...P....H^88...[....>.....wxm^#+P..J3.=...I+..Wt.jt.\.5p......o.W7.rJ<..N....u'L|C8\>.U'].......u4E...~zm..q...y.\..!;<A...+.....Z.^..g..2;....V.1-...dm:St."..L..o.......6..,.6m[..C..e6.A...woX
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):188416
                                                                                                                Entropy (8bit):6.499787367146845
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3072:ZCV26MqgQTc5F446iYNpK5SB7BJBzLZDKJtIs8di/3:Zi2VWTyFsJ8gNJBnGtIC
                                                                                                                MD5:CD2D5D07602E244AE1546D1961088062
                                                                                                                SHA1:32B9D3518E2889D38914E8848F2896F9DAAE4256
                                                                                                                SHA-256:2C4C09C99469B54615DCFD2A748D0E5E7697F0A943FDAD8CAE5CC054E1270551
                                                                                                                SHA-512:1A1B3CCB9CEF636310B8D2A1EABC670DA291683EFA1FDE63EC7F3E7417C3C44F4E808F794EACD9487DE7342C9B7AF346BE5C1D9CCF88BAD0D07043452C419143
                                                                                                                Malicious:false
                                                                                                                Preview:..................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................................................................................................DaL.....h..C..\...Y...L..h..
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):152576
                                                                                                                Entropy (8bit):7.998692969323915
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:3072:ouwkRgYTcMBcCynVXJVrlVI+fgr70ttuNZiVWv8pDed/X:huYTcMiCyNJfVI2grQDYziDeh
                                                                                                                MD5:B2DD53268D83BAA953D96D39A8875882
                                                                                                                SHA1:5320800AE2E0CF728D3B4739FB1258C8B729631C
                                                                                                                SHA-256:BA5CE916A346A64728607A8E4EF74C421E68D309C0F2E1D44F23DE74BA60314D
                                                                                                                SHA-512:78A6A0BEEA0B0A443762797AB153F4B00F14F525581ADD1CA25FA502B243059A83E732C5540087D8EBFC1FF2F26081D7A309C276EBE5A30F7158E4012A6759FB
                                                                                                                Malicious:false
                                                                                                                Preview:...~.iQ...Z.....p{....8...6...r.;.e....i.HXa.dC....k.-1.h..q5..}I.B4.0..b^.S...|@.jq.Zy.S..L...-AGe..#...!.y.._...!\...|.M0.`.....u...2 ..0.....{.cU..V...Qd...1..L.....c..]Z...F..w..K.......;...0.OS...S.Ym..H..b\v..Vh..|....-.t.....K_&......C..?.q.j.....Lt\..o.....x...2.^.....l.y)/.G5,.........Z.....i^.4....|.1%..hri.).m.;f....'...Z.q.M...[.%.$T.;.[K..._..9:...../Y.......}.....}.^.~..Tq.,...eYW..i....[^...X..v..e...H_.F..9......X.5....ES....C..8..S.g...Y.......f}..q.D.B....:X.%...&g6Hn.%.=..T.;...f.............>;.!..-./...a..A.H.qo..#.X...+_...-.......W.q..'.otouj.....B.k,z=.3.l....w..W.O...Cv..l?Lu.!hk..U..zw......dg8S7}}.....c.9`.=v~+.>(..sPxY...3.+7.^...zh...FzZ....=.{...........~...p....Y:..5~.';.T1.....|*......c..N*x...z.8./..C...0.p.My}.Q.........<.br...g. .[..........h..2...`J..m...a....e....(.*5..<V.0..t..GLi....,'{..:f.g.4.-D......WX.#.....;3}........fE$R..3.....'qA.....:..`.-..u..$G......h....s..z.3......!.z...B.D;NtD...w.,.u... iR
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):27648
                                                                                                                Entropy (8bit):7.993100424457694
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:768:Dfae7KDbScEMkoqvGIqDnYKWcWfPZdpMUaCp:Df/ODeloqv0LYdZdpX7
                                                                                                                MD5:5BCC56E4241E8341737B9599F82AAFCC
                                                                                                                SHA1:F46BAEE6528A63E2C77BA9FCD65F3AD1AD929FD1
                                                                                                                SHA-256:9117405E9A295EFAF60C2CD1E9BD3F30C25C5B8B1FE4C7461CFF53596DDCBC1D
                                                                                                                SHA-512:835E360297D9786DBA9EE55A61F9BF912E95B05C3D07FB868483F1DE54575634C1FAFDD284999DAFCE1BCD6FB6B1E788EACFC07071F1C06E8758FC05468E9FFC
                                                                                                                Malicious:false
                                                                                                                Preview:....6......`...r.z.s$.[7.A.....)6..kk.U......./.!.......G.R0o...b....e.7..6.....3...I+..og..c#...............~.%..p..i.=P.b4...YLp........r.s...T.......C.....c0W....mz.c.?y.^......k...k........w.2%l..;..*...0.^~ZK...g.1H....B{.9'.Bb.<..*.........q.~=.}p.#I.2.B..G....S.A... euu........D...mT..0fme9.P.S....X%...".....9-.!.F+i.....].....w),.U..g9.T.Sm..t.REF.V.Wu<|.>9s.......hJ....m^Z.._ejhk.#.K..).<.E.....%.7..B..`}p..p..m.C/!..WH..4......(..1.6.v.....IVoNg..%.....|..YQ.o.9-..5..,....I.L..oV}gW...A7LBb1.\i.U[,.._..\..O..H......V*.I.$.q.6....6......FPuv.&.v......._}..Lz....ghU9/....q.Y.......].(.O..hHU....q+......q.'w....Q.H..f.....v....}?6m#..*S0.k.I..4......2.....]...G.1qF..v"........8t.......Wx.J..t...T.....T.c.p...8...(w....u]&`..K^...Y..Fnw...B...15...6.1Z>...#...dq.#...X.i....A.Vc.NOT..J..+..Y..R.D..Hp..=..;.]L?..C...E..Y5..m...u.V...N.:....}[.w..O.$..,.k="u...C...h.g.{&g..'.e.QW.U+!.b.w......5...G......c|.a....H.;........lTH..
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):297984
                                                                                                                Entropy (8bit):6.46232283283167
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:WcaG9b2M8JTDD/xcq21R1p/rAOPOei7TdFT:WcN9b2MyZa31troPTdFT
                                                                                                                MD5:FBC9947EB416771F0033633639CD8829
                                                                                                                SHA1:6B50FB814906FC6CE6A57687001909E1860E65AB
                                                                                                                SHA-256:AD5AFC43908BE11DBE82E7CE4868861110DC18DBD11D209F352AC79C3208FC78
                                                                                                                SHA-512:D619A2153CE26EA49CA14E54743A986454F7BE37323ACD667930BCBDA02C2F23261261B10C062A52EA9344FCB960F3C4633A83F060C5A05BE09E02EBAEFF5095
                                                                                                                Malicious:false
                                                                                                                Preview:......&..F.....3.^]...U..E.Vj...@..0.E.P.P?....u..u....K....&..F......N......W.}.......8.u..H...t.Q.i......p.....I..............t.Q.J............_. .3.^]...U......4SVW.}.3.\$............G..H..+.....t..D$...G..H...............L$...T...L$ ..T...G..p.........N..D$ SSP.T$...C......D$ .L$.P.Z..9\$.tL.L$......u?.t$..L$4.\...L$0.....L$0......_....].t.........#..C........]....p....L$ ..u...^...L$...^...Y..^...L$...^.....]..G..p....D....E..~..@..0...2....N...j..t$...~..YY..u.......#..C....._^3.[..]...U..QS.].VW.E...{..v..C..H........u..E..C..0.......F....x......C.tC.p.......F..8.C..0......u..F.W.0.....u...........F......>.....0...p....F..8.C..p....^....F.j.W.0....I..}............G......7.(.....ul..<.I.=....u_.}..tY.C..p.........F..0....I..C..0........F..8.C..p........F.j.W.0....I..}......V....G......7_^3.[..]...U......4.E.SVW.X.3..@..\$..p.......N..T$ ...D$ .A..D$$.A..D$(.A...D$,...B...t$$.L$ j.j.j.j.j.h@.K...9..;.u.h@.K..L$$..Y..j...X.I..D$.Ph.;I.j.j.h<=I...\.I..
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):70258
                                                                                                                Entropy (8bit):7.101351350600179
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:zDP8WBosd0bHazf0Tye4Ur2+9BSCVoyO15DuOKHnrxbxZiUCu2iPaLTQ7Q1tCwqZ:kWyu0uZo2+9BBVgCOa1ZBPaPQaEwo0yv
                                                                                                                MD5:36F82EA9FB06ED60524914F858622B8E
                                                                                                                SHA1:135CA9B730DAEB73D53F607F09EDD80D4F59057F
                                                                                                                SHA-256:4E6FF0796FC2EFFDCD62D372B482D147615CDD21877BD1A8C50CB649A879D6EE
                                                                                                                SHA-512:C5F1540916970AD22B308F101E1C461681251FA6AE9DF0E7F2141EEF8555FEB9FCCCCBF8FC34C4E2609C7653A3DBB64A055AE199A1F4689DE8CF1F7B32E069CC
                                                                                                                Malicious:false
                                                                                                                Preview:.a....a..eYV<......@..._U...........6...%...jADV...L.......$@TD..Q.).9........l......S.i..L&.t.G..avv....zj.......nozO..y..WT.E.b.T....x..#...f..a.......a.9.6..8.U.vj.%...m....D.{4....|o..P....3. ...|W......~CD......-..x..v{.....~..8..Z..=...%.e......*PN$.^..#.{.../.....q.f.......4....._....R....d.8.G...)m.\^^.,.|\D....'..W..T..i..D"..ax.....B..m..j..c..`..d..nR-?.+.a.c.h...<.."..Ej..O..j;....Z..q.MU...<...=.........1....v...*.:.....y<...#..g.>.0.m.\U.AD...kx.>(..U..c........G.[..MUMR-..........56T.K"..E.[...Nu.....MU.....GEd....C.6p..kU.........l....!.?.|.j.N.[.......YU}>.H\....1;;..........k...9....O...l.f.-K..|>c..?...B.C.K.y..X.yU./.a.E,..........W.=.i.:........|..a...\.D"%.....l.UD>.|.x.[... ^..?Q./l...!......0~....2.C.Y.(..Q.l..R.l,[)Wll...\......}.....R.i.>..4..i........m.<.U...|..H.{...(..-.m.P....Ts..4J....2..%V.K...YY/.]..Vbu.D.R5..eS.m..*..*...Ak. 5.7.!.3...70...i.3..... .. ........DB~".....E......m.~#.L.{............(..T.Y/V
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4994
                                                                                                                Entropy (8bit):7.961428495984065
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:96:SacWhFhE1uf2EIM503BtM8IB5b62aysIFrxTlUzMiRRozQfKA2fwCBe1:SaFhFse0bM8IvsIXTlUxRefwCBe1
                                                                                                                MD5:D1888072161954D16A445153EC6040A9
                                                                                                                SHA1:FC1759DA68B6CDF9EB9B1D6F8815B7EA1DF879DA
                                                                                                                SHA-256:0EC2E259A47F7CF1817124D110A4FD57BE75E21DE31790019250CA661A7CC434
                                                                                                                SHA-512:65A0B67B9FAE883FC722076D69025D3AA508A8D74B056A0D2384E32963080BE63C60EE4DBFC5BBD632C5A9CD394AEDAD0DE9043F50962C1E0CE95A93994D3BC1
                                                                                                                Malicious:false
                                                                                                                Preview:.5..!......4PU=...e.-;......J..."9a...Tx....H......n.G?.....D.....j{..mTj.eA..<.h...c.f..EGn.K.WD...y..GRW.'...,.!........0..HW...:....(v...`.)`k...e?&.".g._.u..B..v..].....7.9....<}R"._}Q.8c_...xN.o.~H.?.......0..C.(..>...N-...y...sJ8.....9.z.l.D%S|.o.liJA..7'g.X.......X.*.S.(...8.#..v.(..S.p..<....-%1e.....t..e-....1...11....%R...H^.d=..,B..+n.^....y!.>J..ZK3....g#.P..2b.y0.N.].U........M.V..:.....Y.60..".o_~...b}2u.Hgs...`X..g>R|.....!i.J.MHw..[...@.c.q ....6..K............8..G.....^......+..Je.......p..,.C...O..5^.D.. ..q..%.!.%.9c......R-...Z`......Ob..z....%O.o.(I.$O..\1......X5Ff.%...R.]....]....xK....y.......2.U."..P.V."...=w/..Pm.0.b..8.T<..l6dU........9..F6.......(........tT....4~Z..6.zV..c...._....I8j*.wy...~^......C.z]W*9...Yg...Z.......<A.........m..g.Go...A:.df.,J\......x3Ti.8|.....[q4.R......6..5....i....N...U..V.........L.+.u.zJ...3_8.......Z..[.h....vI.QDG.K#N.|!........N.`....K.u...........g..'Q..*..Z...@.
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):249856
                                                                                                                Entropy (8bit):6.735541193172345
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:AsegA/12vk6AQzyMfA+eyVPlcBgtoTqnvAk:AsegA/hMyyzlcqikvAk
                                                                                                                MD5:595C05AA784B35E2495FD55FEEAF9AC3
                                                                                                                SHA1:E1A4CA1271D6036FC201852522905537CAFE0C16
                                                                                                                SHA-256:30D423D8754143F56E19B2D611FCD579D2D2FB0A3B8678734BA33BC6ED28CA0B
                                                                                                                SHA-512:7A86795FC90E182CD5973A825F586B1C8C42756D0FBA66214A9AF25424EAB1D641FCE8A7AA7A1FC2CE50E0F39FC05DEC23858DD9AAC26748609753443212F13D
                                                                                                                Malicious:false
                                                                                                                Preview: t...@t...G.....G.....@t..G........O.....@t.;...|.;.s........................u...........y.3.B................;.~......u........u..J..............t=.......RPWQ.....0................9~...............N.............E.+.F............t6..t..>0t-N........0.!..u..5..L.....I.8.t.@..u.+.....................@t5......t......-.....t......+.....t...... ...............+...........+....u.......P......Wj ..........................Q......P......P...........t....u.......P......Wj0....................t}..~y..H............Pj..E.....P......P........u?9.....t7............P.......E.......P.t....................u..(..........#............Q......PV.:..............x#...t.......P......Wj ......................t.P.@..3.Y................................................._^[t........ap..M.3........].....................B...B...B.*.B.x.B...B...B...B.U..U..B.@t..z..t/.J.x....M...........E.R...P....YY...u..E....].E...].U..V.u...~.W.}.W.u.N.u.........?.t....._^].U..V.u.W.}....E..G.@t.....u..M..
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):87040
                                                                                                                Entropy (8bit):4.18192877457095
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:V+AGWBA60iPTcf4qSq25N8EH/i6mxyyM0Dj2Bmgari07LULTN3Efr8qQ:V+l6JPTcUNx6/xhgariwYLTN3Efrc
                                                                                                                MD5:1BAF48ABD8F03670E93A0661DE886959
                                                                                                                SHA1:7C24E3C81A0322E83011C09CC17525E1DFDB6B2C
                                                                                                                SHA-256:3EB6327A36A819AC3F137D35F92A15BE94DA1B6E5DF3BF57D6FD197EF8969A1E
                                                                                                                SHA-512:260AB7DC6989031F791CC40007A9E2179CD624560E38E23A910223EE18DEB4E83F9F72555901F0E96158E956FA0124FD233D897FA333068FA74F7BAFFAFAC41E
                                                                                                                Malicious:false
                                                                                                                Preview:_______________________________________.________________________________._...............................................................................................................................____.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):199680
                                                                                                                Entropy (8bit):7.99920207739452
                                                                                                                Encrypted:true
                                                                                                                SSDEEP:6144:mj2XEWFo7mf3VnH/SfCvX+ir9IPBml+MhvVIbp:tXAy5DBmA+yqbp
                                                                                                                MD5:F463DED2FF01C0A48BC2A7AEE85E1C6E
                                                                                                                SHA1:EA7B00B13248DC3C5A944C28713BF1D8DD70189C
                                                                                                                SHA-256:46C29BFE671B94D549A3F214F474843224707DA3B6A46AEC61E14F8FAE05BF9E
                                                                                                                SHA-512:9693345117105079641E538C8624BB8DE5C04516EA3ECC3E43595AD84A1F99968182524C263F33522DAF78EC5DA3AB37E29080F15391C4E45A98168C68C6028D
                                                                                                                Malicious:false
                                                                                                                Preview:WS..7a.@S.C....M.s...T....5.bL....,.Z/n......p)....?z...cnW+.....o....&.......b..8.9F.([.......o/...Z.q:S.vt.}O...D..U)..W...v...L...b....}...xru.+.....U..J..`...1.g@..2o....oy..W..G....7I..+...@r~.?.vj+._/U..L......p[....f.V.........-q...k..x..!L..W.#F....72zV...;...y.e.8..p.+4......k.l..2..'.../.YK..u..`.[...w..M_.....{#..(f..l.Mhx..~....P....3e..?>......[2...$..\...m....*.K....\.-..Z~..%.2._.A.^..&.C.Z.J}M.>..F.5!.W..s...@e@K.b~].>...bt`...F@g. ....f2&..+...7.C..p.....f_.|O.b. ...|.T._v.X[Sk.I(W...._..a.h..0c.x.c.....#`..e..b....4.....m.x.(.e...d..k.<g...$b..Mi.C.K..(p..f8..r. ....4.L..H........`.k.../.T.|A..FKE...t.1'.6g].$...ET..E...n.S..B=...QP.D..o..0.....^....q.Z..}.@.$....nM....n...k.............I..5...*.<3l...Q4.e&..O.........%..a.>.~..v......&@PN......Jx....F./'..:..-K;q.../....z|.<Ng....Q.dA...~c.....CI...X....$>.gg}E<..J....=l*.. ....).:..;....2..?L........:L.U.?.l\J..4..X..e...&..+....-*..{0.......#..I3.m..?N%.j...gJ...D.W()
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):100864
                                                                                                                Entropy (8bit):6.485854482494036
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:1536:rT33kLmdI52QC2mCYKw2cr2RhXbZ9qu/nDw2a1+YRroJQusWMIcdw/0YXowGF:lhQC2mCYK3RhrZ9dPk2Q9yMJw/0YRG
                                                                                                                MD5:7FF7F1E0CC2BB5A6EAC9C21762EE66B2
                                                                                                                SHA1:8E8B1E55C1AE4C6D07C79D120182ACD3A5DB64D5
                                                                                                                SHA-256:AC25BF2734049C16094A1B0D5C1749D11F10F2655D59FA6CFE923E12956F2074
                                                                                                                SHA-512:F29C814F327F379A72823BBAE55D0FD3DF792F7D4F21CD8939F7FAB266D3CB8E075C05938DA667D4D674B30D61FF088F2C9B55CF822471F65CD2AE3A52ABABE9
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3.W.R`..R`..R`.K...R`.K...R`.K...R`...c..R`...e..R`...d..R`..*...R`..Ra..R`.h.e..R`.h.`..R`.m....R`.h.b..R`.Rich.R`.........................PE..L....*.`...........!................. ....... ............................................@.........................P}..X.......(....................................v...............................v..@............ ...............................text............................... ..`.rdata...f... ...h..................@..@.data................n..............@....gfids...............v..............@..@.rsrc................x..............@..@.reloc...............z..............@..B................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:current ar archive
                                                                                                                Category:dropped
                                                                                                                Size (bytes):7714
                                                                                                                Entropy (8bit):5.195466820637186
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:96:UCm/+uYlVlOKU3A/hknkbKJKSKU//DjnK:9VlN/hNyy
                                                                                                                MD5:60558B29DB81AD274A8F992882932426
                                                                                                                SHA1:ECCC072B4FB1BB9204B633BE4A6C2D783E71A2A9
                                                                                                                SHA-256:9278D85FDE55F645CAFC39946B1832985B85FB6AAC23938EDF0C6D5AD3027109
                                                                                                                SHA-512:1B1A6364942309811108B1F1A34E465F0415848D8EC557879C7C4522B13BA594130A224F5055262E1FC8A94AA96C9F5FB037F5A1B1936B2EBF09B3199E358678
                                                                                                                Malicious:false
                                                                                                                Preview:!<arch>./ 1569745864 0 1704 `..../...*...p.......................................................................................................................................................................z...z........__IMPORT_DESCRIPTOR_VMProtectSDK32.__NULL_IMPORT_DESCRIPTOR..VMProtectSDK32_NULL_THUNK_DATA._VMProtectIsProtected@0.__imp__VMProtectIsProtected@0._VMProtectBegin@4.__imp__VMProtectBegin@4._VMProtectBeginVirtualization@4.__imp__VMProtectBeginVirtualization@4._VMProtectBeginMutation@4.__imp__VMProtectBeginMutation@4._VMProtectBeginUltra@4.__imp__VMProtectBeginUltra@4._VMProtectBeginVirtualizationLockByKey@4.__imp__VMProtectBeginVirtualizationLockByKey@4._VMProtectBeginUltraLockByKey@4.__imp__VMProtectBeginUltraLockByKey@4._VMProtectEnd@0.__imp__VMProtectEnd@0._VMProtectIsDebuggerPresent@4.__imp__VMProtectIsDebuggerPresent@4._VMProtectIsVirtualMachinePresent@0.__imp__VMProtectIsVirtualMachinePresent@0._VMProtectIsValidImageCRC@0.__im
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):161
                                                                                                                Entropy (8bit):4.452994404347537
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:qFEEbxbLYFNiFEOpSiRFPUS0MDEJpijWLyyANJFa2GN+3/LdQWF8xblfMn:qpZLCJOpvSMDEedyAbuN+P18ZlfM
                                                                                                                MD5:4324149D23C0D89F490249E531460C21
                                                                                                                SHA1:96A44574A5C71D923E91E6CC3E8A7EB7A9727755
                                                                                                                SHA-256:A6F1509DDEB9B80F94E3EC9DE3821BB129979201C6833F472D25FAB16187C1EE
                                                                                                                SHA-512:C8C49722367D49FFB540CDA2ED3FE955027050F810B0E05A501030C2EA5DFF44F1A12CCB94C3D982DBADB9F5211ED199CC81D8457FD2821433975261E1C5C82E
                                                                                                                Malicious:false
                                                                                                                Preview:In autoexec.lua, paste any and all scripts you want to run whenever..celery loads up in a game.....Also, don't change the filename...it must be "autoexec.lua" :)
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4434432
                                                                                                                Entropy (8bit):6.433183425437036
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:LikvPpFjV8b8bhnNcZXGDQc6jg8mHdnYvLyv5ttr24Y4AxYWAF7yWGxmR/qSDQey:0ZXGU7k8Ol5/24PqNmOQ
                                                                                                                MD5:B0F566FC20DE341E2848A489F69A4E48
                                                                                                                SHA1:7A81AB4C68DDEB1E0A83C37E17286AE53E29C334
                                                                                                                SHA-256:5223F453B44BE5D13F5F249F1F23B020B75C7E237C23712D97813C430015AFC6
                                                                                                                SHA-512:4BA8394BEDE49DE1DD1AD98AFA59E0546B5118CF6B75DCF2CC83F00FDE88BDA0D659944C3324D19960D935D9E29E69F8B9B08FA5D5DB7F71506E13471BBCB75F
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 3%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V*m..K...K...K...3...K..7...K..7...K..7...K..7...K..7...K..Y3...K...K..nJ...6...K...6..#K...6...K...6...K...K...K...6...K..Rich.K..........PE..L.....d...........!...#.@9...........7......P9.............................. E...........@...........................@.p... .@.......C.......................C.......>.8.....................>.......>.@............P9. ............................text..._?9......@9................. ..`.rdata..v....P9......D9.............@..@.data...L.....@..T....@.............@....rsrc.........C.......B.............@..@.reloc........C.......B.............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):3
                                                                                                                Entropy (8bit):1.584962500721156
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:C:C
                                                                                                                MD5:CB5AE17636E975F9BF71DDF5BC542075
                                                                                                                SHA1:180505679CFE0CCA79BAE51FDDA0296B7CD9C493
                                                                                                                SHA-256:14BE4B45F18E0D8C67B4F719B5144EEE88497E413709D11D85B096D8E2346310
                                                                                                                SHA-512:957F720B6D516C8E273968C9BE2FFBE146329C1A11A2097844206F030DFDE1F4EFE3379EB68316D1C7426457144D9576DAD04E46B10C0CA8D8B9A5D668387A1B
                                                                                                                Malicious:false
                                                                                                                Preview:0.1
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):5831
                                                                                                                Entropy (8bit):5.485763295217236
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:48:SClA9KbxnWqU6o+MKd2kbcrzQUuPIKtcuMj18SYlt+gtXvsY9W2XApEdF0/JxNyV:nlAkbAeo+BcPNuMuLlhtX7ptv0/H9Cww
                                                                                                                MD5:F6BD9CA8A75D0E07CFD57177CF7BDAB3
                                                                                                                SHA1:A876290038821CE7AE8D14E3DB3286323F22CAA7
                                                                                                                SHA-256:6B1F4C2089B4086BDFD8B11E90721BAFFE74DDAD2240C787E0245E49E93AC332
                                                                                                                SHA-512:3B1521A404C47C795D2C960BC3EDB5E91CC5E598DA3C135C16D46B74DD59A0D3DD44C4DC3158F347489B283A7194BF100389CFEB87D8379E6FCC791705FBFB1A
                                                                                                                Malicious:false
                                                                                                                Preview:gmDjEd_3C\aJps_np;;pEUCD.fZF...."!!!..... !$.C2/uJ.oCQeON.V..l_d"!!!............"!!!..... ..0/./p.DJNddB.UT.c`nq"uo!............"!!!........././K94.Ac_U.S_Fgb<ggems.._........."!!!........././.411E\4JEd_3aknhtubpF*+WLQeC..c."!!!......../1.CEB3:T4.BD=RP8kc9cgwu.\SF........"!!!........//.2:D7:U.)3Md_JpRcbUqjuIbVW.UT._ets"mcf........1../562C333.PbTJlBrnvfuyF*+WLQeC..c."!!!............7246.5(.E\4JcslQemqjRdRPE../pvrnvElb..R.........2111#5".T>.FinuqcbEuR..1R``FqhrdkfCh.._.........21!1. !.E.%/pvrnvElb0.R.E_cQcsphfFto............2!!1. !..('.mscvclsE.Qe.Nf6FcrrA"jho............2!!!. !..'!.udLsFspl.dRBE5/WCslr"eo!............"!!!. !.. !._O.kufzsO..M0QTMc`jx"!s!............"!!!. ... !.l.6Hputb.UT.0UdUlq_d"!u!............"!!!.....#).j/5.abvcW`dB.._....."!!!............"!!!....$(!..7@/kdTsOda$Xd_Fp9r9eovTTYcQ........"!!!..... !..6@AcM.v.Ff.A\+P..b."!!!............"!!!..... ..1C33w.1mNORJTUUYb`mc"!s!............"!!!........647Bn1D.TQf4.dRFkm<`ndfb..]........."!!!........././.515A_=DRC]D+ogswt?p.ScF
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):3
                                                                                                                Entropy (8bit):1.584962500721156
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:C:C
                                                                                                                MD5:CB5AE17636E975F9BF71DDF5BC542075
                                                                                                                SHA1:180505679CFE0CCA79BAE51FDDA0296B7CD9C493
                                                                                                                SHA-256:14BE4B45F18E0D8C67B4F719B5144EEE88497E413709D11D85B096D8E2346310
                                                                                                                SHA-512:957F720B6D516C8E273968C9BE2FFBE146329C1A11A2097844206F030DFDE1F4EFE3379EB68316D1C7426457144D9576DAD04E46B10C0CA8D8B9A5D668387A1B
                                                                                                                Malicious:false
                                                                                                                Preview:0.1
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):5
                                                                                                                Entropy (8bit):1.3709505944546687
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:S:S
                                                                                                                MD5:F0016F1D09AEA25AFCB3FB5948ACBB9F
                                                                                                                SHA1:5151F95AD805265D9169FB020297C97B589A90CB
                                                                                                                SHA-256:CC1A4126BA1A738F56187A2A2A9DF4F3D3F6BAA8DC966FEED9D0F6E09A5A486A
                                                                                                                SHA-512:DA19CC04A0A6CC175F056CE4BB5091CB1F7A4EFA922704DDEDCE2AA7DBFDA8E53709A81206234744D8EF34C97FD1A31EA0F62ECD41ED7977064DC5ECE36477EF
                                                                                                                Malicious:false
                                                                                                                Preview:0.100
                                                                                                                Process:C:\Users\user\Desktop\Celery.exe
                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):19652288
                                                                                                                Entropy (8bit):7.0162939611807635
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:393216:hqA/D2IIyzg8DolBo6i0KoI6Di42sC1/syU3DXNs6hq8:hqcaZyV0fC1JOpjhq8
                                                                                                                MD5:88FD7DBF04BCF75123D02009AEA3F7F7
                                                                                                                SHA1:CECF16BDAD71E54AFC941179EA2B7438A04EFA1D
                                                                                                                SHA-256:01481B9A862936FBC090BDA4033F22D7FFA5A7BFE5DC32F47C7794332B34EEC4
                                                                                                                SHA-512:2C6298B5ADF91B51F0042D48E0846F5B196D52A588FD4FC577BF19EC26AD8E547382279A15F8BF131B08B0D7C140534AFF25F82D5E8998818B812E72C9493917
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$........g..............T'.0....T ......I2..............~-............t.......t.................x...........~'......~1......~ ......~6......T0.......3......~5.....Rich............................PE..L...Z..W...........!..........Z............ ................................;.......,...@.............................5...x.........'.\.............+.......0.....@2..................................@............ ...............................text...R........................... ..`.rodata............................. ..`.rdata...9.. ....9.................@..@.data...p...........................@....rsrc...\.....'.....................@..@.reloc..R.....0....... .............@..B................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):65440
                                                                                                                Entropy (8bit):6.049806962480652
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:
                                                                                                                MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                                                                SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                                                                SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                Entropy (8bit):7.974946893120815
                                                                                                                TrID:
                                                                                                                • Win64 Executable GUI (202006/5) 92.65%
                                                                                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                                • DOS Executable Generic (2002/1) 0.92%
                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                File name:Celery.exe
                                                                                                                File size:13'919'256 bytes
                                                                                                                MD5:42c32b8ee377ce3bcf36f51fb7bc93a8
                                                                                                                SHA1:819d0926c93704884a882967d820d6f753732d37
                                                                                                                SHA256:c91c0745dcd02dbffa34747dd26e85e3e124a62d0812c125b6bc67792b66c8dc
                                                                                                                SHA512:d9c5d1a4ab4c873d819a36d6b2219667d01cd5007a6c1f9c8828c5bd0f0907a56ec1cdf3339274805db53e572c1a259f8193ad8738e0f6e4b8caceec5a84b284
                                                                                                                SSDEEP:393216:uEtDIsayzJASQzBVLw1HY80t92B3s6Mo85oZBn55i1C:uEVHZASUYH50tCVdmoZB55iA
                                                                                                                TLSH:93E63388E7C501E5D0A6EA39CDA78D04F7363C062B32579F86B4017A2EA7751CE3E752
                                                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........B#..,p..,p..,p.:.p..,p.:.p5.,p.:.p..,p<..p..,p<.(q..,p<./q..,p<.)q..,p...p..,p...p..,p...p..,p..-p..,p2.)q..,p2.,q..,p2..p..,
                                                                                                                Icon Hash:1515d4d4442f2d2d
                                                                                                                Entrypoint:0x140026670
                                                                                                                Entrypoint Section:.text
                                                                                                                Digitally signed:false
                                                                                                                Imagebase:0x140000000
                                                                                                                Subsystem:windows gui
                                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                                Time Stamp:0x65DC5383 [Mon Feb 26 09:01:55 2024 UTC]
                                                                                                                TLS Callbacks:
                                                                                                                CLR (.Net) Version:
                                                                                                                OS Version Major:5
                                                                                                                OS Version Minor:2
                                                                                                                File Version Major:5
                                                                                                                File Version Minor:2
                                                                                                                Subsystem Version Major:5
                                                                                                                Subsystem Version Minor:2
                                                                                                                Import Hash:e8a30656287fe831c9782204ed10cd68
                                                                                                                Instruction
                                                                                                                dec eax
                                                                                                                sub esp, 28h
                                                                                                                call 00007FF6C491DD98h
                                                                                                                dec eax
                                                                                                                add esp, 28h
                                                                                                                jmp 00007FF6C491D72Fh
                                                                                                                int3
                                                                                                                int3
                                                                                                                dec eax
                                                                                                                mov eax, esp
                                                                                                                dec eax
                                                                                                                mov dword ptr [eax+08h], ebx
                                                                                                                dec eax
                                                                                                                mov dword ptr [eax+10h], ebp
                                                                                                                dec eax
                                                                                                                mov dword ptr [eax+18h], esi
                                                                                                                dec eax
                                                                                                                mov dword ptr [eax+20h], edi
                                                                                                                inc ecx
                                                                                                                push esi
                                                                                                                dec eax
                                                                                                                sub esp, 20h
                                                                                                                dec ebp
                                                                                                                mov edx, dword ptr [ecx+38h]
                                                                                                                dec eax
                                                                                                                mov esi, edx
                                                                                                                dec ebp
                                                                                                                mov esi, eax
                                                                                                                dec eax
                                                                                                                mov ebp, ecx
                                                                                                                dec ecx
                                                                                                                mov edx, ecx
                                                                                                                dec eax
                                                                                                                mov ecx, esi
                                                                                                                dec ecx
                                                                                                                mov edi, ecx
                                                                                                                inc ecx
                                                                                                                mov ebx, dword ptr [edx]
                                                                                                                dec eax
                                                                                                                shl ebx, 04h
                                                                                                                dec ecx
                                                                                                                add ebx, edx
                                                                                                                dec esp
                                                                                                                lea eax, dword ptr [ebx+04h]
                                                                                                                call 00007FF6C491CCF3h
                                                                                                                mov eax, dword ptr [ebp+04h]
                                                                                                                and al, 66h
                                                                                                                neg al
                                                                                                                mov eax, 00000001h
                                                                                                                sbb edx, edx
                                                                                                                neg edx
                                                                                                                add edx, eax
                                                                                                                test dword ptr [ebx+04h], edx
                                                                                                                je 00007FF6C491D8C3h
                                                                                                                dec esp
                                                                                                                mov ecx, edi
                                                                                                                dec ebp
                                                                                                                mov eax, esi
                                                                                                                dec eax
                                                                                                                mov edx, esi
                                                                                                                dec eax
                                                                                                                mov ecx, ebp
                                                                                                                call 00007FF6C491F583h
                                                                                                                dec eax
                                                                                                                mov ebx, dword ptr [esp+30h]
                                                                                                                dec eax
                                                                                                                mov ebp, dword ptr [esp+38h]
                                                                                                                dec eax
                                                                                                                mov esi, dword ptr [esp+40h]
                                                                                                                dec eax
                                                                                                                mov edi, dword ptr [esp+48h]
                                                                                                                dec eax
                                                                                                                add esp, 20h
                                                                                                                inc ecx
                                                                                                                pop esi
                                                                                                                ret
                                                                                                                int3
                                                                                                                int3
                                                                                                                int3
                                                                                                                dec eax
                                                                                                                sub esp, 48h
                                                                                                                dec eax
                                                                                                                lea ecx, dword ptr [esp+20h]
                                                                                                                call 00007FF6C491C7C3h
                                                                                                                dec eax
                                                                                                                lea edx, dword ptr [00023BA7h]
                                                                                                                dec eax
                                                                                                                lea ecx, dword ptr [esp+20h]
                                                                                                                call 00007FF6C491E992h
                                                                                                                int3
                                                                                                                jmp 00007FF6C4924760h
                                                                                                                int3
                                                                                                                int3
                                                                                                                int3
                                                                                                                int3
                                                                                                                int3
                                                                                                                int3
                                                                                                                Programming Language:
                                                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x4b1e00x34.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x4b2140x50.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x710000xe360.rsrc
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6c0000x2ab4.pdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x938.reloc
                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x460e00x54.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x461800x28.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3de100x140.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x3b0000x4a0.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4a4ac0x100.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                .text0x10000x3988e0x39a002e51ec74609fbaf5c08ca97ff655ea65False0.5453963869305857data6.4643560143194545IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                .rdata0x3b0000x1118c0x1120095dee35be54e2acf2d2e961bb0d495e8False0.44718008667883213data5.216118347289193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .data0x4d0000x1ef5c0x1a00148867e92396c2a403730872d91149f7False0.2765925480769231DOS executable (block device driver o\3050)3.1779391259225855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                .pdata0x6c0000x2ab40x2c00d3d5c7ef0e59ba49d0bb4142316d42d5False0.47993607954545453data5.395487196100669IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .didat0x6f0000x3080x400f83dedcddf9ceb5084b7159064aebc44False0.23828125data2.796337056872422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                _RDATA0x700000x15c0x2004a3322e97146b4fbd4ed6f2bbc580541False0.408203125data3.318036041719511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .rsrc0x710000xe3600xe400de9f51d017ba3a6fbb2d9d60d0118abbFalse0.6301226699561403data6.59668280263086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .reloc0x800000x9380xa00c057cd0b29d094da3cebf433be170d6dFalse0.498828125data5.228587706357198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                PNG0x716800xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                                                PNG0x721c80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                                                RT_ICON0x737780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                                                                RT_ICON0x73ce00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                                                                RT_ICON0x745880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                                                                RT_ICON0x754300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                                                                RT_ICON0x758980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                                                                RT_ICON0x769400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                                                                RT_ICON0x78ee80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                                                                RT_DIALOG0x7d5b80x286dataEnglishUnited States0.5092879256965944
                                                                                                                RT_DIALOG0x7d3880x13adataEnglishUnited States0.60828025477707
                                                                                                                RT_DIALOG0x7d4c80xecdataEnglishUnited States0.6991525423728814
                                                                                                                RT_DIALOG0x7d2580x12edataEnglishUnited States0.5927152317880795
                                                                                                                RT_DIALOG0x7cf200x338dataEnglishUnited States0.45145631067961167
                                                                                                                RT_DIALOG0x7ccc80x252dataEnglishUnited States0.5757575757575758
                                                                                                                RT_STRING0x7df980x1e2dataEnglishUnited States0.3900414937759336
                                                                                                                RT_STRING0x7e1800x1ccdataEnglishUnited States0.4282608695652174
                                                                                                                RT_STRING0x7e3500x1b8dataEnglishUnited States0.45681818181818185
                                                                                                                RT_STRING0x7e5080x146dataEnglishUnited States0.5153374233128835
                                                                                                                RT_STRING0x7e6500x46cdataEnglishUnited States0.3454063604240283
                                                                                                                RT_STRING0x7eac00x166dataEnglishUnited States0.49162011173184356
                                                                                                                RT_STRING0x7ec280x152dataEnglishUnited States0.5059171597633136
                                                                                                                RT_STRING0x7ed800x10adataEnglishUnited States0.49624060150375937
                                                                                                                RT_STRING0x7ee900xbcdataEnglishUnited States0.6329787234042553
                                                                                                                RT_STRING0x7ef500x1c0dataEnglishUnited States0.5178571428571429
                                                                                                                RT_STRING0x7f1100x250dataEnglishUnited States0.44256756756756754
                                                                                                                RT_GROUP_ICON0x7cc600x68dataEnglishUnited States0.7019230769230769
                                                                                                                RT_MANIFEST0x7d8400x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                                                DLLImport
                                                                                                                KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, GetCurrentProcessId, CreateDirectoryW, RemoveDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetCurrentProcess, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapReAlloc, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP
                                                                                                                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                                                gdiplus.dllGdipCloneImage, GdipAlloc, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                EnglishUnited States
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Apr 27, 2024 12:01:09.363820076 CEST5189953192.168.2.41.1.1.1
                                                                                                                Apr 27, 2024 12:01:09.456336021 CEST53518991.1.1.1192.168.2.4
                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                Apr 27, 2024 12:01:09.363820076 CEST192.168.2.41.1.1.10x3865Standard query (0)jVkuFBkAgxQTjEleejFjuecf.jVkuFBkAgxQTjEleejFjuecfA (IP address)IN (0x0001)false
                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                Apr 27, 2024 12:01:09.456336021 CEST1.1.1.1192.168.2.40x3865Name error (3)jVkuFBkAgxQTjEleejFjuecf.jVkuFBkAgxQTjEleejFjuecfnonenoneA (IP address)IN (0x0001)false

                                                                                                                Click to jump to process

                                                                                                                Click to jump to process

                                                                                                                Click to dive into process behavior distribution

                                                                                                                Click to jump to process

                                                                                                                Target ID:0
                                                                                                                Start time:12:00:56
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Users\user\Desktop\Celery.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:"C:\Users\user\Desktop\Celery.exe"
                                                                                                                Imagebase:0x7ff6db590000
                                                                                                                File size:13'919'256 bytes
                                                                                                                MD5 hash:42C32B8EE377CE3BCF36F51FB7BC93A8
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:1
                                                                                                                Start time:12:01:02
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\Celery V3.exe"
                                                                                                                Imagebase:0x400000
                                                                                                                File size:157'301'232 bytes
                                                                                                                MD5 hash:06E7DDAE83EEE00448A508F9BADAB598
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 13%, Virustotal, Browse
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:2
                                                                                                                Start time:12:01:05
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\System32\cmd.exe" /c move Earned Earned.cmd && Earned.cmd
                                                                                                                Imagebase:0x240000
                                                                                                                File size:236'544 bytes
                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:3
                                                                                                                Start time:12:01:05
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:4
                                                                                                                Start time:12:01:06
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:tasklist
                                                                                                                Imagebase:0xd0000
                                                                                                                File size:79'360 bytes
                                                                                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:5
                                                                                                                Start time:12:01:06
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:findstr /I "wrsa.exe opssvc.exe"
                                                                                                                Imagebase:0xbc0000
                                                                                                                File size:29'696 bytes
                                                                                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:6
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:tasklist
                                                                                                                Imagebase:0xd0000
                                                                                                                File size:79'360 bytes
                                                                                                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:7
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                                                                                                Imagebase:0xbc0000
                                                                                                                File size:29'696 bytes
                                                                                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:8
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:cmd /c md 1101
                                                                                                                Imagebase:0xb70000
                                                                                                                File size:236'544 bytes
                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:9
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:findstr /V "CalculationsExpediaJumpExchanges" Application
                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                File size:29'696 bytes
                                                                                                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:10
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:cmd /c copy /b Trials + Explains + External + Fighting + Get + Rights 1101\z
                                                                                                                Imagebase:0x240000
                                                                                                                File size:236'544 bytes
                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:11
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\Spy.pif
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:1101\Spy.pif 1101\z
                                                                                                                Imagebase:0x980000
                                                                                                                File size:893'608 bytes
                                                                                                                MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                                • Detection: 7%, ReversingLabs
                                                                                                                • Detection: 3%, Virustotal, Browse
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:12
                                                                                                                Start time:12:01:07
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\SysWOW64\PING.EXE
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:ping -n 5 127.0.0.1
                                                                                                                Imagebase:0x4b0000
                                                                                                                File size:18'944 bytes
                                                                                                                MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:19
                                                                                                                Start time:12:02:33
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1101\RegAsm.exe
                                                                                                                Imagebase:0x460000
                                                                                                                File size:65'440 bytes
                                                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                Has elevated privileges:false
                                                                                                                Has administrator privileges:false
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000013.00000002.2851258914.0000000000542000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 0%, ReversingLabs
                                                                                                                • Detection: 0%, Virustotal, Browse
                                                                                                                Reputation:high
                                                                                                                Has exited:false

                                                                                                                Target ID:20
                                                                                                                Start time:12:02:38
                                                                                                                Start date:27/04/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:false
                                                                                                                Has administrator privileges:false
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:false

                                                                                                                Reset < >

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:14.3%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:31.9%
                                                                                                                  Total number of Nodes:2000
                                                                                                                  Total number of Limit Nodes:31
                                                                                                                  execution_graph 20448 7ff6db5aeca0 20793 7ff6db59215c 20448->20793 20450 7ff6db5aeceb 20451 7ff6db5aecff 20450->20451 20452 7ff6db5af9a3 20450->20452 20606 7ff6db5aed1c 20450->20606 20456 7ff6db5aed0f 20451->20456 20457 7ff6db5aedeb 20451->20457 20451->20606 21055 7ff6db5b2ea0 20452->21055 20461 7ff6db5aedb9 20456->20461 20462 7ff6db5aed17 20456->20462 20463 7ff6db5aeea1 20457->20463 20468 7ff6db5aee05 20457->20468 20458 7ff6db5af9d9 20464 7ff6db5afa00 GetDlgItem IsDlgButtonChecked 20458->20464 20465 7ff6db5af9e5 SendDlgItemMessageW 20458->20465 20459 7ff6db5af9ca IsDlgButtonChecked 20459->20458 20467 7ff6db5aeddb EndDialog 20461->20467 20461->20606 20471 7ff6db59aee0 48 API calls 20462->20471 20462->20606 20801 7ff6db591ebc GetDlgItem 20463->20801 21074 7ff6db597a28 GetCurrentDirectoryW 20464->21074 20465->20464 20467->20606 20472 7ff6db59aee0 48 API calls 20468->20472 20474 7ff6db5aed46 20471->20474 20475 7ff6db5aee23 SetDlgItemTextW 20472->20475 20473 7ff6db5afa57 GetDlgItem 21084 7ff6db592120 20473->21084 21087 7ff6db591a94 34 API calls _handle_error 20474->21087 20480 7ff6db5aee36 20475->20480 20478 7ff6db5aef05 20494 7ff6db5af7d5 20478->20494 20616 7ff6db5aeec1 EndDialog 20478->20616 20479 7ff6db5aef18 GetDlgItem 20484 7ff6db5aef5f SetFocus 20479->20484 20485 7ff6db5aef32 IsDlgButtonChecked IsDlgButtonChecked 20479->20485 20486 7ff6db5aee50 GetMessageW 20480->20486 20480->20606 20483 7ff6db5aed56 20491 7ff6db5aed6c 20483->20491 21088 7ff6db59210c 20483->21088 20487 7ff6db5aef75 20484->20487 20488 7ff6db5af002 20484->20488 20485->20484 20493 7ff6db5aee6e IsDialogMessageW 20486->20493 20486->20606 20815 7ff6db59aee0 20487->20815 21091 7ff6db592314 20488->21091 20489 7ff6db5aeeea 20496 7ff6db591b70 31 API calls 20489->20496 20505 7ff6db5afe73 20491->20505 20491->20606 20493->20480 20500 7ff6db5aee83 TranslateMessage DispatchMessageW 20493->20500 20501 7ff6db59aee0 48 API calls 20494->20501 20496->20606 20499 7ff6db5af03c 21101 7ff6db5b2a90 33 API calls 2 library calls 20499->21101 20500->20480 20506 7ff6db5af7e6 SetDlgItemTextW 20501->20506 20502 7ff6db5aef7f 20822 7ff6db5912bc 20502->20822 21159 7ff6db5bae54 20505->21159 20509 7ff6db59aee0 48 API calls 20506->20509 20508 7ff6db5af047 20513 7ff6db59aee0 48 API calls 20508->20513 20514 7ff6db5af818 20509->20514 20519 7ff6db5af065 20513->20519 20530 7ff6db5912bc 33 API calls 20514->20530 20516 7ff6db5afe78 20525 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20516->20525 21102 7ff6db59d9c0 20519->21102 20520 7ff6db5aefa8 20832 7ff6db5b2bb4 20520->20832 20532 7ff6db5afe7e 20525->20532 20559 7ff6db5af841 20530->20559 20543 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20532->20543 20536 7ff6db5b2bb4 24 API calls 20540 7ff6db5af088 20536->20540 20548 7ff6db591b70 31 API calls 20540->20548 20542 7ff6db5af8ea 20551 7ff6db59aee0 48 API calls 20542->20551 20553 7ff6db5afe84 20543->20553 20558 7ff6db5af096 20548->20558 20550 7ff6db5af0fc 20562 7ff6db5af12a 20550->20562 21106 7ff6db59587c 20550->21106 20564 7ff6db5af8f4 20551->20564 20552 7ff6db5aeff8 20552->20550 21105 7ff6db5b3544 33 API calls 2 library calls 20552->21105 20568 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20553->20568 20558->20532 20558->20552 20559->20542 20570 7ff6db5912bc 33 API calls 20559->20570 20846 7ff6db59552c 20562->20846 20575 7ff6db5912bc 33 API calls 20564->20575 20569 7ff6db5afe8a 20568->20569 20582 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20569->20582 20576 7ff6db5af88f 20570->20576 20581 7ff6db5af91d 20575->20581 20584 7ff6db59aee0 48 API calls 20576->20584 20579 7ff6db5af144 GetLastError 20580 7ff6db5af15c 20579->20580 20858 7ff6db598cf8 20580->20858 20598 7ff6db5912bc 33 API calls 20581->20598 20588 7ff6db5afe90 20582->20588 20589 7ff6db5af89a 20584->20589 20586 7ff6db5af11e 21109 7ff6db5ad8c8 12 API calls _handle_error 20586->21109 20599 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20588->20599 21145 7ff6db591170 33 API calls memcpy_s 20589->21145 20592 7ff6db5af16e 20596 7ff6db5af184 20592->20596 20597 7ff6db5af175 GetLastError 20592->20597 20602 7ff6db5af22c 20596->20602 20607 7ff6db5af23b 20596->20607 20608 7ff6db5af19b GetTickCount 20596->20608 20597->20596 20603 7ff6db5af95e 20598->20603 20604 7ff6db5afe96 20599->20604 20600 7ff6db5af8b2 21146 7ff6db591c04 20600->21146 20602->20607 20624 7ff6db5af689 20602->20624 20617 7ff6db591b70 31 API calls 20603->20617 20609 7ff6db59215c 61 API calls 20604->20609 21150 7ff6db5b5bf0 20606->21150 20613 7ff6db5af560 20607->20613 21110 7ff6db597c10 20607->21110 20861 7ff6db595238 20608->20861 20612 7ff6db5afef4 20609->20612 20618 7ff6db5afef8 20612->20618 20627 7ff6db5aff99 GetDlgItem SetFocus 20612->20627 20655 7ff6db5aff0d 20612->20655 20613->20616 21134 7ff6db596e5c 20613->21134 20614 7ff6db5af8ce 20621 7ff6db591b70 31 API calls 20614->20621 20616->20489 20625 7ff6db5af988 20617->20625 20634 7ff6db5b5bf0 _handle_error 8 API calls 20618->20634 20629 7ff6db5af8dc 20621->20629 20640 7ff6db59aee0 48 API calls 20624->20640 20632 7ff6db591b70 31 API calls 20625->20632 20638 7ff6db5affca 20627->20638 20636 7ff6db591b70 31 API calls 20629->20636 20630 7ff6db5af25e 21122 7ff6db59bc8c 131 API calls 20630->21122 20631 7ff6db5af1ca 20871 7ff6db591b70 20631->20871 20641 7ff6db5af993 20632->20641 20643 7ff6db5b05a7 20634->20643 20636->20542 20651 7ff6db5912bc 33 API calls 20638->20651 20646 7ff6db5af6b7 SetDlgItemTextW 20640->20646 20647 7ff6db591b70 31 API calls 20641->20647 20642 7ff6db5af59a 20648 7ff6db59aee0 48 API calls 20642->20648 20644 7ff6db5af278 20650 7ff6db59d9c0 48 API calls 20644->20650 20645 7ff6db5af1d8 20876 7ff6db594334 20645->20876 20653 7ff6db592134 20646->20653 20647->20489 20654 7ff6db5af5a7 20648->20654 20649 7ff6db5aff44 SendDlgItemMessageW 20656 7ff6db5aff64 20649->20656 20657 7ff6db5aff6d EndDialog 20649->20657 20658 7ff6db5af2ba GetCommandLineW 20650->20658 20652 7ff6db5affdc 20651->20652 21164 7ff6db598e0c 20652->21164 20662 7ff6db5af6d5 SetDlgItemTextW GetDlgItem 20653->20662 21143 7ff6db591170 33 API calls memcpy_s 20654->21143 20655->20618 20655->20649 20656->20657 20657->20618 20659 7ff6db5af35f 20658->20659 20660 7ff6db5af379 20658->20660 21123 7ff6db591c80 20659->21123 21127 7ff6db5ae664 33 API calls _handle_error 20660->21127 20667 7ff6db5af700 GetWindowLongPtrW SetWindowLongPtrW 20662->20667 20668 7ff6db5af723 20662->20668 20667->20668 20896 7ff6db5b0998 20668->20896 20669 7ff6db5af5ba 20674 7ff6db591b70 31 API calls 20669->20674 20670 7ff6db59210c SetDlgItemTextW 20676 7ff6db5b0004 20670->20676 20671 7ff6db5af38a 21128 7ff6db5ae664 33 API calls _handle_error 20671->21128 20681 7ff6db5af5c5 20674->20681 20686 7ff6db5b0036 SendDlgItemMessageW FindFirstFileW 20676->20686 20678 7ff6db5af214 20892 7ff6db59424c 20678->20892 20679 7ff6db5af205 GetLastError 20679->20678 20685 7ff6db591b70 31 API calls 20681->20685 20682 7ff6db5af39b 21129 7ff6db5ae664 33 API calls _handle_error 20682->21129 20684 7ff6db5b0998 188 API calls 20689 7ff6db5af74c 20684->20689 20690 7ff6db5af5d3 20685->20690 20691 7ff6db5b008b 20686->20691 20786 7ff6db5b0514 20686->20786 21047 7ff6db5b3484 20689->21047 20700 7ff6db59aee0 48 API calls 20690->20700 20701 7ff6db59aee0 48 API calls 20691->20701 20692 7ff6db5af3ac 21130 7ff6db59bd2c 131 API calls 20692->21130 20697 7ff6db5af3c3 21131 7ff6db5b36a0 33 API calls 20697->21131 20698 7ff6db5b0591 20698->20618 20699 7ff6db5b0998 188 API calls 20714 7ff6db5af77a 20699->20714 20704 7ff6db5af5eb 20700->20704 20705 7ff6db5b00ae 20701->20705 20703 7ff6db5b05b9 20707 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20703->20707 20715 7ff6db5912bc 33 API calls 20704->20715 20716 7ff6db5912bc 33 API calls 20705->20716 20706 7ff6db5af3e2 CreateFileMappingW 20709 7ff6db5af421 MapViewOfFile 20706->20709 20710 7ff6db5af463 ShellExecuteExW 20706->20710 20711 7ff6db5b05be 20707->20711 20708 7ff6db5af7a6 21144 7ff6db591e98 GetDlgItem EnableWindow 20708->21144 21132 7ff6db5b6dd0 20709->21132 20722 7ff6db5af484 20710->20722 20717 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20711->20717 20714->20708 20718 7ff6db5b0998 188 API calls 20714->20718 20728 7ff6db5af614 20715->20728 20719 7ff6db5b00dd 20716->20719 20720 7ff6db5b05c4 20717->20720 20718->20708 21168 7ff6db591170 33 API calls memcpy_s 20719->21168 20726 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20720->20726 20724 7ff6db5af4d3 20722->20724 20725 7ff6db5af4a6 WaitForInputIdle 20722->20725 20723 7ff6db5b00f8 21169 7ff6db5952c0 20723->21169 20735 7ff6db5af4ff 20724->20735 20736 7ff6db5af4ec UnmapViewOfFile CloseHandle 20724->20736 20731 7ff6db5af4bb 20725->20731 20732 7ff6db5b05ca 20726->20732 20727 7ff6db5af66a 20729 7ff6db591b70 31 API calls 20727->20729 20728->20569 20728->20727 20729->20616 20731->20724 20734 7ff6db5af4c1 Sleep 20731->20734 20739 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20732->20739 20733 7ff6db5b010f 20737 7ff6db591b70 31 API calls 20733->20737 20734->20724 20734->20731 20735->20553 20738 7ff6db5af535 20735->20738 20736->20735 20741 7ff6db5b011c 20737->20741 20740 7ff6db591b70 31 API calls 20738->20740 20742 7ff6db5b05d0 20739->20742 20743 7ff6db5af552 20740->20743 20741->20711 20746 7ff6db591b70 31 API calls 20741->20746 20744 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20742->20744 20745 7ff6db591b70 31 API calls 20743->20745 20747 7ff6db5b05d6 20744->20747 20745->20613 20748 7ff6db5b0183 20746->20748 20750 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20747->20750 20749 7ff6db59210c SetDlgItemTextW 20748->20749 20751 7ff6db5b0197 FindClose 20749->20751 20752 7ff6db5b05dc 20750->20752 20753 7ff6db5b01b3 20751->20753 20754 7ff6db5b02a7 SendDlgItemMessageW 20751->20754 21179 7ff6db5ade04 10 API calls _handle_error 20753->21179 20756 7ff6db5b02db 20754->20756 20759 7ff6db59aee0 48 API calls 20756->20759 20757 7ff6db5b01d6 20758 7ff6db59aee0 48 API calls 20757->20758 20760 7ff6db5b01df 20758->20760 20761 7ff6db5b02e8 20759->20761 20762 7ff6db59d9c0 48 API calls 20760->20762 20763 7ff6db5912bc 33 API calls 20761->20763 20766 7ff6db5b01fc memcpy_s 20762->20766 20765 7ff6db5b0317 20763->20765 20764 7ff6db591b70 31 API calls 20767 7ff6db5b0293 20764->20767 21180 7ff6db591170 33 API calls memcpy_s 20765->21180 20766->20720 20766->20764 20769 7ff6db59210c SetDlgItemTextW 20767->20769 20769->20754 20770 7ff6db5b0332 20771 7ff6db5952c0 33 API calls 20770->20771 20772 7ff6db5b0349 20771->20772 20773 7ff6db591b70 31 API calls 20772->20773 20774 7ff6db5b0355 memcpy_s 20773->20774 20775 7ff6db591b70 31 API calls 20774->20775 20776 7ff6db5b038f 20775->20776 20777 7ff6db591b70 31 API calls 20776->20777 20778 7ff6db5b039c 20777->20778 20778->20732 20779 7ff6db591b70 31 API calls 20778->20779 20780 7ff6db5b0403 20779->20780 20781 7ff6db59210c SetDlgItemTextW 20780->20781 20782 7ff6db5b0417 20781->20782 20782->20786 21181 7ff6db5ade04 10 API calls _handle_error 20782->21181 20784 7ff6db5b0442 20785 7ff6db59aee0 48 API calls 20784->20785 20787 7ff6db5b044c 20785->20787 20786->20618 20786->20698 20786->20703 20786->20747 20788 7ff6db59d9c0 48 API calls 20787->20788 20791 7ff6db5b0469 memcpy_s 20788->20791 20789 7ff6db591b70 31 API calls 20790 7ff6db5b0500 20789->20790 20792 7ff6db59210c SetDlgItemTextW 20790->20792 20791->20742 20791->20789 20792->20786 20794 7ff6db5921d0 20793->20794 20795 7ff6db59216a 20793->20795 20794->20450 20795->20794 21182 7ff6db59a8ac 20795->21182 20797 7ff6db59218f 20797->20794 20798 7ff6db5921a4 GetDlgItem 20797->20798 20798->20794 20799 7ff6db5921b7 20798->20799 20799->20794 20800 7ff6db5921be SetDlgItemTextW 20799->20800 20800->20794 20802 7ff6db591f34 20801->20802 20804 7ff6db591efc 20801->20804 21281 7ff6db591ff8 GetWindowTextLengthW 20802->21281 20805 7ff6db5912bc 33 API calls 20804->20805 20806 7ff6db591f2a memcpy_s 20805->20806 20807 7ff6db591b70 31 API calls 20806->20807 20810 7ff6db591f89 20806->20810 20807->20810 20808 7ff6db591fc8 20809 7ff6db5b5bf0 _handle_error 8 API calls 20808->20809 20811 7ff6db591fdd 20809->20811 20810->20808 20812 7ff6db591ff0 20810->20812 20811->20478 20811->20479 20811->20616 20813 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20812->20813 20814 7ff6db591ff5 20813->20814 20816 7ff6db59aef3 20815->20816 21303 7ff6db599b74 20816->21303 20819 7ff6db59af86 20819->20502 20820 7ff6db59af58 LoadStringW 20820->20819 20821 7ff6db59af71 LoadStringW 20820->20821 20821->20819 20823 7ff6db5912f0 20822->20823 20824 7ff6db5913bb 20822->20824 20827 7ff6db5912fe memcpy_s 20823->20827 20828 7ff6db5913b6 20823->20828 20829 7ff6db591358 20823->20829 21332 7ff6db591bd4 33 API calls std::_Xinvalid_argument 20824->21332 20827->20520 21331 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 20828->21331 20829->20827 21322 7ff6db5b5aa0 20829->21322 21344 7ff6db5ae92c PeekMessageW 20832->21344 20835 7ff6db5b2c05 20841 7ff6db5b2c11 ShowWindow IsDlgButtonChecked IsDlgButtonChecked 20835->20841 20836 7ff6db5b2c53 IsDlgButtonChecked IsDlgButtonChecked 20837 7ff6db5b2cb4 IsDlgButtonChecked 20836->20837 20838 7ff6db5b2c99 20836->20838 20839 7ff6db5b2cd3 20837->20839 20840 7ff6db5b2cd6 IsDlgButtonChecked IsDlgButtonChecked 20837->20840 20838->20837 20839->20840 20842 7ff6db5b2d03 IsDlgButtonChecked 20840->20842 20843 7ff6db5b2d28 IsDlgButtonChecked 20840->20843 20841->20836 20842->20843 20844 7ff6db5b5bf0 _handle_error 8 API calls 20843->20844 20845 7ff6db5aefb5 20844->20845 20845->20516 20845->20552 20850 7ff6db595562 20846->20850 20853 7ff6db595671 20846->20853 20847 7ff6db5b5bf0 _handle_error 8 API calls 20848 7ff6db595687 20847->20848 20848->20579 20848->20580 20849 7ff6db59564b 20851 7ff6db595c60 56 API calls 20849->20851 20849->20853 20850->20849 20852 7ff6db5912bc 33 API calls 20850->20852 20855 7ff6db59569c 20850->20855 21349 7ff6db595c60 20850->21349 20851->20853 20852->20850 20853->20847 20856 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20855->20856 20857 7ff6db5956a1 20856->20857 20859 7ff6db598d03 20858->20859 20860 7ff6db598d06 SetCurrentDirectoryW 20858->20860 20859->20860 20860->20592 20862 7ff6db595265 20861->20862 20863 7ff6db59527a 20862->20863 20864 7ff6db5912bc 33 API calls 20862->20864 20865 7ff6db5b5bf0 _handle_error 8 API calls 20863->20865 20864->20863 20866 7ff6db5952b1 20865->20866 20867 7ff6db5ad17c 20866->20867 20868 7ff6db5ad1a3 20867->20868 21495 7ff6db5960e0 20868->21495 20870 7ff6db5ad1b3 memcpy_s 20870->20631 20872 7ff6db591b83 20871->20872 20873 7ff6db591bac 20871->20873 20872->20873 20874 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20872->20874 20873->20645 20875 7ff6db591bd0 20874->20875 20877 7ff6db59436a 20876->20877 20878 7ff6db59439e 20877->20878 20879 7ff6db5943b1 CreateFileW 20877->20879 20880 7ff6db59447f 20878->20880 20881 7ff6db5980b0 49 API calls 20878->20881 20879->20878 20882 7ff6db5944af 20880->20882 20888 7ff6db591c80 33 API calls 20880->20888 20884 7ff6db594409 20881->20884 20883 7ff6db5b5bf0 _handle_error 8 API calls 20882->20883 20885 7ff6db5944c4 20883->20885 20886 7ff6db594446 20884->20886 20887 7ff6db59440d CreateFileW 20884->20887 20885->20678 20885->20679 20886->20880 20889 7ff6db5944d8 20886->20889 20887->20886 20888->20882 20890 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20889->20890 20891 7ff6db5944dd 20890->20891 20893 7ff6db594266 20892->20893 20894 7ff6db594272 20892->20894 20893->20894 21504 7ff6db5942d0 20893->21504 21511 7ff6db5ae518 20896->21511 20898 7ff6db5b0cfe 20899 7ff6db591b70 31 API calls 20898->20899 20900 7ff6db5b0d07 20899->20900 20901 7ff6db5b5bf0 _handle_error 8 API calls 20900->20901 20902 7ff6db5af73b 20901->20902 20902->20684 20903 7ff6db5b2a0a 21624 7ff6db59353c 47 API calls 20903->21624 20904 7ff6db5912bc 33 API calls 20979 7ff6db5b0a13 memcpy_s 20904->20979 20907 7ff6db5b2a10 21625 7ff6db59353c 47 API calls 20907->21625 20909 7ff6db59d120 33 API calls 20909->20979 20910 7ff6db5b2a16 20914 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20910->20914 20912 7ff6db5b29fe 20913 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20912->20913 20915 7ff6db5b2a04 20913->20915 20917 7ff6db5b2a1c 20914->20917 21623 7ff6db59353c 47 API calls 20915->21623 20919 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20917->20919 20921 7ff6db5b2a22 20919->20921 20920 7ff6db5b295a 20922 7ff6db5b29e2 20920->20922 20923 7ff6db591c80 33 API calls 20920->20923 20926 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20921->20926 21621 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 20922->21621 20928 7ff6db5b2987 20923->20928 20924 7ff6db5b29f8 21622 7ff6db591bd4 33 API calls std::_Xinvalid_argument 20924->21622 20925 7ff6db5913c4 33 API calls 20929 7ff6db5b174a GetTempPathW 20925->20929 20930 7ff6db5b2a28 20926->20930 21620 7ff6db5ae6f8 33 API calls 3 library calls 20928->21620 20929->20979 20938 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20930->20938 20931 7ff6db597a28 35 API calls 20931->20979 20936 7ff6db5b299d 20943 7ff6db591b70 31 API calls 20936->20943 20947 7ff6db5b29b4 memcpy_s 20936->20947 20937 7ff6db592120 SetDlgItemTextW 20937->20979 20941 7ff6db5b2a2e 20938->20941 20940 7ff6db5bf054 43 API calls 20940->20979 20945 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20941->20945 20942 7ff6db5b2303 20942->20922 20942->20924 20946 7ff6db5b5aa0 4 API calls 20942->20946 20955 7ff6db5b234b memcpy_s 20942->20955 20943->20947 20944 7ff6db591b70 31 API calls 20944->20922 20949 7ff6db5b2a34 20945->20949 20946->20955 20947->20944 20948 7ff6db5971f4 33 API calls 20948->20979 20954 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20949->20954 20951 7ff6db5ae518 33 API calls 20951->20979 20952 7ff6db5b2a7c 21628 7ff6db591bd4 33 API calls std::_Xinvalid_argument 20952->21628 20953 7ff6db595238 33 API calls 20953->20979 20959 7ff6db5b2a3a 20954->20959 20963 7ff6db591c80 33 API calls 20955->20963 21007 7ff6db5b269f 20955->21007 20957 7ff6db591b70 31 API calls 20957->20920 20958 7ff6db5b2a88 21630 7ff6db591bd4 33 API calls std::_Xinvalid_argument 20958->21630 20968 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20959->20968 20960 7ff6db5b2a82 21629 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 20960->21629 20962 7ff6db5b2a76 21627 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 20962->21627 20970 7ff6db5b2473 20963->20970 20967 7ff6db5b273a 20967->20952 20967->20962 20969 7ff6db5b2782 memcpy_s 20967->20969 20973 7ff6db5b284b memcpy_s 20967->20973 20984 7ff6db5b5aa0 4 API calls 20967->20984 20976 7ff6db5b2a40 20968->20976 21516 7ff6db5b2ff0 20969->21516 20983 7ff6db5912bc 33 API calls 20970->20983 21016 7ff6db5b2a70 20970->21016 20973->20957 20974 7ff6db5b2850 20974->20958 20974->20960 20974->20973 20987 7ff6db5b5aa0 4 API calls 20974->20987 20975 7ff6db5952c0 33 API calls 20975->20979 20988 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20976->20988 20977 7ff6db595ff4 51 API calls 20977->20979 20979->20898 20979->20903 20979->20904 20979->20907 20979->20909 20979->20910 20979->20912 20979->20915 20979->20917 20979->20920 20979->20921 20979->20925 20979->20930 20979->20931 20979->20937 20979->20940 20979->20941 20979->20942 20979->20948 20979->20949 20979->20951 20979->20953 20979->20959 20979->20975 20979->20976 20979->20977 20991 7ff6db5b2a46 20979->20991 20994 7ff6db5972ac 53 API calls 20979->20994 20995 7ff6db59db54 33 API calls 20979->20995 20997 7ff6db5b114c IsDlgButtonChecked 20979->20997 20999 7ff6db5962f0 54 API calls 20979->20999 21000 7ff6db5b2a4c 20979->21000 21008 7ff6db592314 33 API calls 20979->21008 21009 7ff6db5b2a52 20979->21009 21013 7ff6db5b146e SHFileOperationW 20979->21013 21018 7ff6db591c04 33 API calls 20979->21018 21019 7ff6db596dd8 33 API calls 20979->21019 21020 7ff6db59587c 51 API calls 20979->21020 21022 7ff6db591b70 31 API calls 20979->21022 21024 7ff6db59210c SetDlgItemTextW 20979->21024 21030 7ff6db5ad698 31 API calls 20979->21030 21033 7ff6db592274 31 API calls 20979->21033 21036 7ff6db5b1aa9 EndDialog 20979->21036 21038 7ff6db595890 51 API calls 20979->21038 21040 7ff6db5b1631 MoveFileW 20979->21040 21044 7ff6db59552c 56 API calls 20979->21044 21045 7ff6db591c80 33 API calls 20979->21045 21515 7ff6db5a0a5c CompareStringW 20979->21515 21555 7ff6db59ce98 35 API calls _invalid_parameter_noinfo_noreturn 20979->21555 21556 7ff6db5ad22c 33 API calls Concurrency::cancel_current_task 20979->21556 21557 7ff6db5b3efc 31 API calls _invalid_parameter_noinfo_noreturn 20979->21557 21558 7ff6db598ebc 47 API calls memcpy_s 20979->21558 21559 7ff6db5ae344 33 API calls _invalid_parameter_noinfo_noreturn 20979->21559 21560 7ff6db5ad114 33 API calls 20979->21560 21561 7ff6db5adf44 145 API calls 2 library calls 20979->21561 21562 7ff6db5ae6f8 33 API calls 3 library calls 20979->21562 21563 7ff6db5988f8 20979->21563 21579 7ff6db596448 33 API calls 20979->21579 21580 7ff6db597d6c 33 API calls 3 library calls 20979->21580 21581 7ff6db59885c 20979->21581 21585 7ff6db591734 33 API calls 4 library calls 20979->21585 21586 7ff6db595790 20979->21586 21600 7ff6db591170 33 API calls memcpy_s 20979->21600 21601 7ff6db596260 FindClose 20979->21601 21602 7ff6db5a0a8c CompareStringW 20979->21602 21603 7ff6db5ad808 47 API calls 20979->21603 21604 7ff6db5ac3d4 51 API calls 3 library calls 20979->21604 21605 7ff6db5ae664 33 API calls _handle_error 20979->21605 21606 7ff6db598b28 20979->21606 21614 7ff6db597254 CompareStringW 20979->21614 21615 7ff6db598be4 47 API calls 20979->21615 20980 7ff6db5b10f9 GetDlgItem 20986 7ff6db592120 SetDlgItemTextW 20980->20986 20989 7ff6db5b24b6 20983->20989 20984->20969 20990 7ff6db5b1118 IsDlgButtonChecked 20986->20990 20987->20973 20988->20991 21616 7ff6db59d120 20989->21616 20990->20979 20996 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 20991->20996 20994->20979 20995->20979 20996->21000 20997->20979 20999->20979 21003 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21000->21003 21003->21009 21004 7ff6db5912bc 33 API calls 21035 7ff6db5b24e1 21004->21035 21006 7ff6db5b2a64 21011 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21006->21011 21007->20967 21007->20974 21007->21006 21010 7ff6db5b2a6a 21007->21010 21008->20979 21017 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21009->21017 21015 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21010->21015 21011->21010 21012 7ff6db5a0a5c CompareStringW 21012->21035 21013->20979 21015->21016 21626 7ff6db59353c 47 API calls 21016->21626 21021 7ff6db5b2a58 21017->21021 21018->20979 21019->20979 21020->20979 21023 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21021->21023 21022->20979 21025 7ff6db5b2a5e 21023->21025 21024->20979 21029 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21025->21029 21029->21006 21030->20979 21032 7ff6db591b70 31 API calls 21032->21035 21033->20979 21035->21004 21035->21007 21035->21012 21035->21021 21035->21025 21035->21032 21039 7ff6db59d120 33 API calls 21035->21039 21036->20979 21038->20979 21039->21035 21041 7ff6db5b1680 21040->21041 21042 7ff6db5b1665 MoveFileExW 21040->21042 21041->20979 21043 7ff6db591b70 31 API calls 21041->21043 21042->21041 21043->21041 21044->20979 21045->20979 21048 7ff6db5b349d 21047->21048 21049 7ff6db591c80 33 API calls 21048->21049 21050 7ff6db5b34b3 21049->21050 21051 7ff6db5b34e8 21050->21051 21052 7ff6db591c80 33 API calls 21050->21052 21647 7ff6db5a9a30 21051->21647 21052->21051 22067 7ff6db5ac0ec 21055->22067 21058 7ff6db5b2fc7 21060 7ff6db5b5bf0 _handle_error 8 API calls 21058->21060 21059 7ff6db5b2ed7 GetWindow 21064 7ff6db5b2ef2 21059->21064 21061 7ff6db5af9ab 21060->21061 21061->20458 21061->20459 21062 7ff6db5b2efe GetClassNameW 22072 7ff6db5a0a5c CompareStringW 21062->22072 21064->21058 21064->21062 21065 7ff6db5b2fa6 GetWindow 21064->21065 21066 7ff6db5b2f27 GetWindowLongPtrW 21064->21066 21065->21058 21065->21064 21066->21065 21067 7ff6db5b2f39 IsDlgButtonChecked 21066->21067 21067->21065 21068 7ff6db5b2f55 GetObjectW 21067->21068 22073 7ff6db5ac154 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 21068->22073 21070 7ff6db5b2f71 22074 7ff6db5ac11c 21070->22074 22078 7ff6db5ac9f0 16 API calls _handle_error 21070->22078 21073 7ff6db5b2f89 IsDlgButtonChecked DeleteObject 21073->21065 21075 7ff6db597a4c 21074->21075 21081 7ff6db597ad9 21074->21081 21076 7ff6db5913c4 33 API calls 21075->21076 21077 7ff6db597a67 GetCurrentDirectoryW 21076->21077 21078 7ff6db597a8d 21077->21078 21079 7ff6db591c80 33 API calls 21078->21079 21080 7ff6db597a9b 21079->21080 21080->21081 21082 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21080->21082 21081->20473 21083 7ff6db597af5 21082->21083 21085 7ff6db592127 21084->21085 21086 7ff6db59212a SetDlgItemTextW 21084->21086 21085->21086 21087->20483 21089 7ff6db592113 21088->21089 21090 7ff6db592116 SetDlgItemTextW 21088->21090 21089->21090 21092 7ff6db592344 21091->21092 21093 7ff6db5923f8 21091->21093 21096 7ff6db5923a1 21092->21096 21097 7ff6db5923f3 21092->21097 21099 7ff6db592352 memcpy_s 21092->21099 22082 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21093->22082 21096->21099 21100 7ff6db5b5aa0 4 API calls 21096->21100 22081 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21097->22081 21099->20499 21100->21099 21101->20508 22083 7ff6db59d79c 21102->22083 21105->20550 21107 7ff6db595890 51 API calls 21106->21107 21108 7ff6db595885 21107->21108 21108->20562 21108->20586 21109->20562 21111 7ff6db5913c4 33 API calls 21110->21111 21112 7ff6db597c45 21111->21112 21113 7ff6db597c48 GetModuleFileNameW 21112->21113 21116 7ff6db597c98 21112->21116 21114 7ff6db597c63 21113->21114 21115 7ff6db597c9a 21113->21115 21114->21112 21115->21116 21117 7ff6db5912bc 33 API calls 21116->21117 21119 7ff6db597cc2 21117->21119 21118 7ff6db597cfa 21118->20630 21119->21118 21120 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21119->21120 21121 7ff6db597d1c 21120->21121 21122->20644 21124 7ff6db591cc6 21123->21124 21126 7ff6db591c9b memcpy_s 21123->21126 22117 7ff6db591464 33 API calls 3 library calls 21124->22117 21126->20660 21127->20671 21128->20682 21129->20692 21130->20697 21131->20706 21133 7ff6db5b6db0 21132->21133 21133->20710 21135 7ff6db596e7c 21134->21135 21136 7ff6db596ed6 21135->21136 21137 7ff6db596e95 21135->21137 22118 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21136->22118 21139 7ff6db597050 4 API calls 21137->21139 21141 7ff6db596ec3 21139->21141 21142 7ff6db591170 33 API calls memcpy_s 21141->21142 21142->20642 21143->20669 21145->20600 21147 7ff6db591c55 21146->21147 21149 7ff6db591c29 memcpy_s 21146->21149 22119 7ff6db5915a8 33 API calls 3 library calls 21147->22119 21149->20614 21151 7ff6db5b5bf9 21150->21151 21152 7ff6db5afe60 21151->21152 21153 7ff6db5b5ce0 IsProcessorFeaturePresent 21151->21153 21154 7ff6db5b5cf8 21153->21154 22120 7ff6db5b5ed4 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 21154->22120 21156 7ff6db5b5d0b 22121 7ff6db5b5ca0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21156->22121 22122 7ff6db5bad8c 31 API calls _invalid_parameter_noinfo_noreturn 21159->22122 21161 7ff6db5bae6d 22123 7ff6db5bae84 16 API calls abort 21161->22123 21165 7ff6db598e49 21164->21165 21167 7ff6db598e32 21164->21167 22124 7ff6db593550 33 API calls 21165->22124 21167->20670 21168->20723 21171 7ff6db59530e 21169->21171 21170 7ff6db5954a1 22126 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21170->22126 21171->21170 21174 7ff6db595418 21171->21174 21175 7ff6db59549c 21171->21175 21178 7ff6db595314 memcpy_s 21171->21178 21177 7ff6db5b5aa0 4 API calls 21174->21177 21174->21178 22125 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21175->22125 21177->21178 21178->20733 21179->20757 21180->20770 21181->20784 21207 7ff6db5961e8 21182->21207 21186 7ff6db59a989 21213 7ff6db599808 21186->21213 21189 7ff6db59aa03 21194 7ff6db59aac2 21189->21194 21195 7ff6db59aa0c GetWindowLongPtrW 21189->21195 21190 7ff6db59aaf2 GetSystemMetrics GetWindow 21192 7ff6db59ac21 21190->21192 21193 7ff6db59ab1d 21190->21193 21191 7ff6db59a919 21191->21186 21205 7ff6db59a96a SetDlgItemTextW 21191->21205 21228 7ff6db599c00 21191->21228 21196 7ff6db5b5bf0 _handle_error 8 API calls 21192->21196 21193->21192 21203 7ff6db59ab3e GetWindowRect 21193->21203 21206 7ff6db59ac00 GetWindow 21193->21206 21232 7ff6db5999a8 21194->21232 21197 7ff6db5ff270 21195->21197 21200 7ff6db59ac30 21196->21200 21201 7ff6db59aaaa GetWindowRect 21197->21201 21200->20797 21201->21194 21203->21193 21204 7ff6db59aae5 SetDlgItemTextW 21204->21190 21205->21191 21206->21192 21206->21193 21208 7ff6db59620d _snwprintf 21207->21208 21241 7ff6db5bd308 21208->21241 21211 7ff6db5a0644 WideCharToMultiByte 21212 7ff6db5a0686 21211->21212 21212->21191 21214 7ff6db5999a8 47 API calls 21213->21214 21217 7ff6db59984f 21214->21217 21215 7ff6db5b5bf0 _handle_error 8 API calls 21216 7ff6db59998e GetWindowRect GetClientRect 21215->21216 21216->21189 21216->21190 21218 7ff6db5912bc 33 API calls 21217->21218 21227 7ff6db59995a 21217->21227 21219 7ff6db59989c 21218->21219 21220 7ff6db5999a1 21219->21220 21222 7ff6db5912bc 33 API calls 21219->21222 21221 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21220->21221 21223 7ff6db5999a7 21221->21223 21224 7ff6db599914 21222->21224 21225 7ff6db59999c 21224->21225 21224->21227 21226 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21225->21226 21226->21220 21227->21215 21229 7ff6db599c40 21228->21229 21231 7ff6db599c69 21228->21231 21280 7ff6db5bd5ec 31 API calls 2 library calls 21229->21280 21231->21191 21233 7ff6db5961e8 swprintf 46 API calls 21232->21233 21234 7ff6db5999eb 21233->21234 21235 7ff6db5a0644 WideCharToMultiByte 21234->21235 21236 7ff6db599a03 21235->21236 21237 7ff6db599c00 31 API calls 21236->21237 21238 7ff6db599a1b 21237->21238 21239 7ff6db5b5bf0 _handle_error 8 API calls 21238->21239 21240 7ff6db599a2b 21239->21240 21240->21190 21240->21204 21242 7ff6db5bd34e 21241->21242 21243 7ff6db5bd366 21241->21243 21268 7ff6db5c0b6c 15 API calls _invalid_parameter_noinfo_noreturn 21242->21268 21243->21242 21245 7ff6db5bd370 21243->21245 21270 7ff6db5bb308 35 API calls 2 library calls 21245->21270 21246 7ff6db5bd353 21269 7ff6db5bae34 31 API calls _invalid_parameter_noinfo_noreturn 21246->21269 21249 7ff6db5b5bf0 _handle_error 8 API calls 21251 7ff6db596229 21249->21251 21250 7ff6db5bd381 __scrt_get_show_window_mode 21271 7ff6db5bb288 15 API calls _set_fmode 21250->21271 21251->21211 21253 7ff6db5bd3ec 21272 7ff6db5bb710 46 API calls 3 library calls 21253->21272 21255 7ff6db5bd3f5 21256 7ff6db5bd3fd 21255->21256 21258 7ff6db5bd42c 21255->21258 21273 7ff6db5c0ddc 21256->21273 21259 7ff6db5bd484 21258->21259 21260 7ff6db5bd43b 21258->21260 21261 7ff6db5bd4aa 21258->21261 21262 7ff6db5bd432 21258->21262 21263 7ff6db5c0ddc Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 21259->21263 21265 7ff6db5c0ddc Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 21260->21265 21261->21259 21264 7ff6db5bd4b4 21261->21264 21262->21259 21262->21260 21267 7ff6db5bd35e 21263->21267 21266 7ff6db5c0ddc Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 21264->21266 21265->21267 21266->21267 21267->21249 21268->21246 21269->21267 21270->21250 21271->21253 21272->21255 21274 7ff6db5c0de1 RtlRestoreThreadPreferredUILanguages 21273->21274 21275 7ff6db5c0e11 Concurrency::details::SchedulerProxy::DeleteThis 21273->21275 21274->21275 21276 7ff6db5c0dfc 21274->21276 21275->21267 21279 7ff6db5c0b6c 15 API calls _invalid_parameter_noinfo_noreturn 21276->21279 21278 7ff6db5c0e01 GetLastError 21278->21275 21279->21278 21280->21231 21293 7ff6db5913c4 21281->21293 21284 7ff6db592094 21285 7ff6db5912bc 33 API calls 21284->21285 21287 7ff6db5920a2 21285->21287 21286 7ff6db5b5bf0 _handle_error 8 API calls 21289 7ff6db5920f3 21286->21289 21288 7ff6db5920dd 21287->21288 21290 7ff6db592105 21287->21290 21288->21286 21289->20806 21291 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21290->21291 21292 7ff6db59210a 21291->21292 21294 7ff6db5913cd 21293->21294 21300 7ff6db59144d GetWindowTextW 21293->21300 21295 7ff6db59145d 21294->21295 21298 7ff6db5913ee __scrt_get_show_window_mode 21294->21298 21302 7ff6db591be8 33 API calls std::_Xinvalid_argument 21295->21302 21301 7ff6db59196c 31 API calls _invalid_parameter_noinfo_noreturn 21298->21301 21300->21284 21301->21300 21310 7ff6db599a38 21303->21310 21306 7ff6db599bd9 21308 7ff6db5b5bf0 _handle_error 8 API calls 21306->21308 21307 7ff6db599c00 31 API calls 21307->21306 21309 7ff6db599bf2 21308->21309 21309->20819 21309->20820 21311 7ff6db599a92 21310->21311 21319 7ff6db599b30 21310->21319 21312 7ff6db5a0644 WideCharToMultiByte 21311->21312 21314 7ff6db599ac0 21311->21314 21312->21314 21313 7ff6db5b5bf0 _handle_error 8 API calls 21315 7ff6db599b64 21313->21315 21316 7ff6db599aef 21314->21316 21320 7ff6db59ae88 45 API calls _snwprintf 21314->21320 21315->21306 21315->21307 21321 7ff6db5bd5ec 31 API calls 2 library calls 21316->21321 21319->21313 21320->21316 21321->21319 21324 7ff6db5b5aab 21322->21324 21323 7ff6db5b5ac4 21323->20827 21324->21323 21326 7ff6db5b5aca 21324->21326 21333 7ff6db5bf088 21324->21333 21329 7ff6db5b5ad5 21326->21329 21336 7ff6db5b670c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21326->21336 21337 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21329->21337 21338 7ff6db5bf0c8 21333->21338 21336->21329 21343 7ff6db5c27e8 EnterCriticalSection 21338->21343 21345 7ff6db5ae990 GetDlgItem 21344->21345 21346 7ff6db5ae94c GetMessageW 21344->21346 21345->20835 21345->20836 21347 7ff6db5ae97a TranslateMessage DispatchMessageW 21346->21347 21348 7ff6db5ae96b IsDialogMessageW 21346->21348 21347->21345 21348->21345 21348->21347 21351 7ff6db595c8f 21349->21351 21350 7ff6db595cbc 21369 7ff6db595890 21350->21369 21351->21350 21353 7ff6db595ca8 CreateDirectoryW 21351->21353 21353->21350 21355 7ff6db595d59 21353->21355 21357 7ff6db595d69 21355->21357 21383 7ff6db595ff4 21355->21383 21356 7ff6db595d6d GetLastError 21356->21357 21360 7ff6db5b5bf0 _handle_error 8 API calls 21357->21360 21362 7ff6db595d95 21360->21362 21362->20850 21363 7ff6db595d17 21365 7ff6db595d50 21363->21365 21366 7ff6db595daa 21363->21366 21364 7ff6db595cfc CreateDirectoryW 21364->21363 21365->21355 21365->21356 21367 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21366->21367 21368 7ff6db595daf 21367->21368 21370 7ff6db5958b8 21369->21370 21371 7ff6db5958bb GetFileAttributesW 21369->21371 21370->21371 21372 7ff6db5958cc 21371->21372 21379 7ff6db595949 21371->21379 21374 7ff6db5980b0 49 API calls 21372->21374 21373 7ff6db5b5bf0 _handle_error 8 API calls 21375 7ff6db59595d 21373->21375 21376 7ff6db5958f3 21374->21376 21375->21356 21397 7ff6db5980b0 21375->21397 21377 7ff6db595910 21376->21377 21378 7ff6db5958f7 GetFileAttributesW 21376->21378 21377->21379 21380 7ff6db59596d 21377->21380 21378->21377 21379->21373 21381 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21380->21381 21382 7ff6db595972 21381->21382 21384 7ff6db59601e SetFileAttributesW 21383->21384 21385 7ff6db59601b 21383->21385 21386 7ff6db596034 21384->21386 21393 7ff6db5960b5 21384->21393 21385->21384 21387 7ff6db5980b0 49 API calls 21386->21387 21389 7ff6db596059 21387->21389 21388 7ff6db5b5bf0 _handle_error 8 API calls 21390 7ff6db5960ca 21388->21390 21391 7ff6db59607c 21389->21391 21392 7ff6db59605d SetFileAttributesW 21389->21392 21390->21357 21391->21393 21394 7ff6db5960da 21391->21394 21392->21391 21393->21388 21395 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21394->21395 21396 7ff6db5960df 21395->21396 21398 7ff6db5980ef 21397->21398 21399 7ff6db5980e8 21397->21399 21401 7ff6db5912bc 33 API calls 21398->21401 21400 7ff6db5b5bf0 _handle_error 8 API calls 21399->21400 21402 7ff6db595cf8 21400->21402 21403 7ff6db59811a 21401->21403 21402->21363 21402->21364 21404 7ff6db59836b 21403->21404 21405 7ff6db59813a 21403->21405 21406 7ff6db597a28 35 API calls 21404->21406 21407 7ff6db598154 21405->21407 21408 7ff6db5981ed 21405->21408 21410 7ff6db59838a 21406->21410 21435 7ff6db59874f 21407->21435 21470 7ff6db597050 21407->21470 21432 7ff6db5912bc 33 API calls 21408->21432 21468 7ff6db5981e8 21408->21468 21409 7ff6db598593 21415 7ff6db597050 4 API calls 21409->21415 21454 7ff6db598773 21409->21454 21410->21409 21413 7ff6db5983bf 21410->21413 21410->21468 21422 7ff6db597050 4 API calls 21413->21422 21442 7ff6db598761 21413->21442 21414 7ff6db598755 21424 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21414->21424 21420 7ff6db5985fa 21415->21420 21417 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21426 7ff6db59877f 21417->21426 21418 7ff6db59874a 21431 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21418->21431 21419 7ff6db5981a7 21427 7ff6db591b70 31 API calls 21419->21427 21433 7ff6db5981b9 memcpy_s 21419->21433 21487 7ff6db5911ec 33 API calls memcpy_s 21420->21487 21447 7ff6db59841a memcpy_s 21422->21447 21423 7ff6db598779 21423->21417 21425 7ff6db59875b 21424->21425 21436 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21425->21436 21438 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21426->21438 21427->21433 21429 7ff6db598767 21441 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21429->21441 21430 7ff6db591b70 31 API calls 21430->21468 21431->21435 21439 7ff6db598262 21432->21439 21433->21430 21434 7ff6db59860d 21488 7ff6db596d64 33 API calls memcpy_s 21434->21488 21489 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21435->21489 21436->21442 21437 7ff6db591b70 31 API calls 21452 7ff6db598499 21437->21452 21443 7ff6db598785 21438->21443 21478 7ff6db596dd8 21439->21478 21445 7ff6db59876d 21441->21445 21490 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21442->21490 21491 7ff6db59353c 47 API calls 21445->21491 21447->21429 21447->21437 21448 7ff6db591b70 31 API calls 21451 7ff6db598690 21448->21451 21449 7ff6db5952c0 33 API calls 21465 7ff6db59828d memcpy_s 21449->21465 21455 7ff6db591b70 31 API calls 21451->21455 21458 7ff6db5984c5 21452->21458 21486 7ff6db591734 33 API calls 4 library calls 21452->21486 21453 7ff6db59861d memcpy_s 21453->21426 21453->21448 21492 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21454->21492 21457 7ff6db59869a 21455->21457 21456 7ff6db591b70 31 API calls 21460 7ff6db598311 21456->21460 21461 7ff6db591b70 31 API calls 21457->21461 21458->21445 21462 7ff6db5912bc 33 API calls 21458->21462 21463 7ff6db591b70 31 API calls 21460->21463 21461->21468 21464 7ff6db598566 21462->21464 21463->21468 21466 7ff6db591c04 33 API calls 21464->21466 21465->21425 21465->21456 21467 7ff6db598583 21466->21467 21469 7ff6db591b70 31 API calls 21467->21469 21468->21399 21468->21414 21468->21418 21468->21423 21469->21468 21471 7ff6db59709d 21470->21471 21474 7ff6db5970b2 memcpy_s 21470->21474 21472 7ff6db5970e4 21471->21472 21473 7ff6db59715d 21471->21473 21471->21474 21472->21474 21477 7ff6db5b5aa0 4 API calls 21472->21477 21493 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21473->21493 21474->21419 21477->21474 21479 7ff6db596e01 21478->21479 21480 7ff6db596e13 21479->21480 21481 7ff6db596e56 21479->21481 21483 7ff6db597050 4 API calls 21480->21483 21494 7ff6db591bd4 33 API calls std::_Xinvalid_argument 21481->21494 21485 7ff6db596e3e 21483->21485 21485->21449 21486->21458 21487->21434 21488->21453 21496 7ff6db5961da 21495->21496 21497 7ff6db59610f 21495->21497 21503 7ff6db59353c 47 API calls 21496->21503 21501 7ff6db59611f memcpy_s 21497->21501 21502 7ff6db595004 33 API calls 2 library calls 21497->21502 21501->20870 21502->21501 21505 7ff6db594302 21504->21505 21506 7ff6db5942ea 21504->21506 21507 7ff6db594326 21505->21507 21510 7ff6db593a64 99 API calls 21505->21510 21506->21505 21508 7ff6db5942f6 FindCloseChangeNotification 21506->21508 21507->20894 21508->21505 21510->21507 21512 7ff6db5ae546 21511->21512 21513 7ff6db5ae53f 21511->21513 21512->21513 21631 7ff6db591734 33 API calls 4 library calls 21512->21631 21513->20979 21515->20979 21521 7ff6db5b3039 __scrt_get_show_window_mode 21516->21521 21532 7ff6db5b338d 21516->21532 21517 7ff6db591b70 31 API calls 21518 7ff6db5b33ac 21517->21518 21519 7ff6db5b5bf0 _handle_error 8 API calls 21518->21519 21520 7ff6db5b33b8 21519->21520 21520->20973 21522 7ff6db5b3194 21521->21522 21638 7ff6db5a0a5c CompareStringW 21521->21638 21524 7ff6db5912bc 33 API calls 21522->21524 21525 7ff6db5b31d0 21524->21525 21526 7ff6db59587c 51 API calls 21525->21526 21527 7ff6db5b31da 21526->21527 21528 7ff6db591b70 31 API calls 21527->21528 21533 7ff6db5b31e5 21528->21533 21529 7ff6db5b3252 ShellExecuteExW 21530 7ff6db5b3265 21529->21530 21531 7ff6db5b3356 21529->21531 21534 7ff6db5b329e WaitForInputIdle 21530->21534 21535 7ff6db5b3284 IsWindowVisible 21530->21535 21537 7ff6db5b32f3 CloseHandle 21530->21537 21531->21532 21540 7ff6db5b340b 21531->21540 21532->21517 21533->21529 21536 7ff6db5912bc 33 API calls 21533->21536 21632 7ff6db5b38e8 21534->21632 21535->21534 21538 7ff6db5b3291 ShowWindow 21535->21538 21541 7ff6db5b3227 21536->21541 21545 7ff6db5b3311 21537->21545 21546 7ff6db5b3302 21537->21546 21538->21534 21543 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21540->21543 21639 7ff6db5972ac 53 API calls 2 library calls 21541->21639 21542 7ff6db5b32b6 21542->21537 21550 7ff6db5b32c4 GetExitCodeProcess 21542->21550 21547 7ff6db5b3410 21543->21547 21545->21531 21552 7ff6db5b3347 ShowWindow 21545->21552 21640 7ff6db5a0a5c CompareStringW 21546->21640 21548 7ff6db5b3235 21551 7ff6db591b70 31 API calls 21548->21551 21550->21537 21553 7ff6db5b32d7 21550->21553 21554 7ff6db5b323f 21551->21554 21552->21531 21553->21537 21554->21529 21555->20979 21556->20979 21557->20979 21558->20979 21559->20979 21560->20979 21561->20980 21562->20979 21564 7ff6db598936 21563->21564 21565 7ff6db592314 33 API calls 21564->21565 21567 7ff6db598946 21565->21567 21566 7ff6db598987 21568 7ff6db591c04 33 API calls 21566->21568 21567->21566 21641 7ff6db591734 33 API calls 4 library calls 21567->21641 21569 7ff6db5989cd 21568->21569 21571 7ff6db5989f0 21569->21571 21572 7ff6db591c80 33 API calls 21569->21572 21573 7ff6db598a28 21571->21573 21575 7ff6db598a44 21571->21575 21572->21571 21574 7ff6db5b5bf0 _handle_error 8 API calls 21573->21574 21576 7ff6db598a39 21574->21576 21577 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21575->21577 21576->20979 21578 7ff6db598a49 21577->21578 21579->20979 21580->20979 21582 7ff6db59887a 21581->21582 21642 7ff6db59367c 21582->21642 21585->21013 21587 7ff6db5957b8 21586->21587 21588 7ff6db5957bb DeleteFileW 21586->21588 21587->21588 21589 7ff6db5957d1 21588->21589 21596 7ff6db595850 21588->21596 21590 7ff6db5980b0 49 API calls 21589->21590 21592 7ff6db5957f6 21590->21592 21591 7ff6db5b5bf0 _handle_error 8 API calls 21593 7ff6db595865 21591->21593 21594 7ff6db595817 21592->21594 21595 7ff6db5957fa DeleteFileW 21592->21595 21593->20979 21594->21596 21597 7ff6db595875 21594->21597 21595->21594 21596->21591 21598 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21597->21598 21599 7ff6db59587a 21598->21599 21600->20979 21602->20979 21603->20979 21604->20979 21605->20979 21607 7ff6db598b40 21606->21607 21608 7ff6db598b57 21607->21608 21609 7ff6db598b89 21607->21609 21611 7ff6db5912bc 33 API calls 21608->21611 21646 7ff6db59353c 47 API calls 21609->21646 21613 7ff6db598b7b 21611->21613 21613->20979 21614->20979 21615->20979 21618 7ff6db59d152 21616->21618 21617 7ff6db59d185 21617->21035 21618->21617 21619 7ff6db591734 33 API calls 21618->21619 21619->21618 21620->20936 21631->21512 21633 7ff6db5b393b WaitForSingleObject 21632->21633 21634 7ff6db5b38f3 PeekMessageW 21633->21634 21635 7ff6db5b394d 21633->21635 21636 7ff6db5b390f GetMessageW TranslateMessage DispatchMessageW 21634->21636 21637 7ff6db5b3938 21634->21637 21635->21542 21636->21637 21637->21633 21638->21522 21639->21548 21640->21545 21641->21566 21645 7ff6db5936c6 __scrt_get_show_window_mode 21642->21645 21643 7ff6db5b5bf0 _handle_error 8 API calls 21644 7ff6db59378a 21643->21644 21644->20979 21645->21643 21648 7ff6db5a9a40 _snwprintf __scrt_get_show_window_mode 21647->21648 21665 7ff6db59bb98 21648->21665 21650 7ff6db5a9ade __scrt_get_show_window_mode 21668 7ff6db5a94d8 21650->21668 21652 7ff6db5a9b3a 21674 7ff6db59bbf4 21652->21674 21654 7ff6db5a9b48 21655 7ff6db5a9b8b 21654->21655 21658 7ff6db5a9cb4 21654->21658 21679 7ff6db5a9cbc 21655->21679 21659 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21658->21659 21661 7ff6db5a9cb9 21659->21661 21662 7ff6db5b5bf0 _handle_error 8 API calls 21663 7ff6db5a9c9e 21662->21663 21663->20699 21664 7ff6db5a9b99 21664->21662 21666 7ff6db5913c4 33 API calls 21665->21666 21667 7ff6db59bbbd 21666->21667 21667->21650 21669 7ff6db5a955f memcpy_s 21668->21669 21670 7ff6db591b70 31 API calls 21669->21670 21671 7ff6db5a9790 memcpy_s 21669->21671 21670->21671 21673 7ff6db5a982f 21671->21673 21707 7ff6db5a7f64 33 API calls 21671->21707 21673->21652 21673->21673 21675 7ff6db59bc02 shared_ptr 21674->21675 21676 7ff6db59bc35 21675->21676 21677 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21675->21677 21676->21654 21678 7ff6db59bc56 21677->21678 21680 7ff6db5a9cca 21679->21680 21681 7ff6db5a9b95 21680->21681 21708 7ff6db593c7c 82 API calls 21680->21708 21681->21664 21683 7ff6db5a6ce4 21681->21683 21709 7ff6db5a76b4 21683->21709 21688 7ff6db5a6f0e 21689 7ff6db5b5bf0 _handle_error 8 API calls 21688->21689 21691 7ff6db5a6f5e 21689->21691 21690 7ff6db592314 33 API calls 21694 7ff6db5a6d41 21690->21694 21691->21664 21694->21688 21694->21690 21697 7ff6db5a6f80 21694->21697 21698 7ff6db5a6e5c 21694->21698 21700 7ff6db5a6f7b 21694->21700 21738 7ff6db5a1d8c 21694->21738 21749 7ff6db596288 21694->21749 21695 7ff6db5a6edb 21756 7ff6db5a5208 21695->21756 21701 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21697->21701 21698->21695 21698->21697 21698->21700 21699 7ff6db5a6ef3 21704 7ff6db5a6eff 21699->21704 21705 7ff6db5a6f10 21699->21705 21702 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21700->21702 21703 7ff6db5a6f86 21701->21703 21702->21697 21763 7ff6db5939e0 82 API calls 21704->21763 21705->21688 21764 7ff6db593ca0 100 API calls 21705->21764 21707->21673 21708->21681 21710 7ff6db596288 55 API calls 21709->21710 21711 7ff6db5a771c 21710->21711 21716 7ff6db5a7737 21711->21716 21765 7ff6db5a4e24 21711->21765 21718 7ff6db5a7997 21716->21718 21719 7ff6db5a7962 21716->21719 21717 7ff6db5b5bf0 _handle_error 8 API calls 21720 7ff6db5a6d16 21717->21720 21722 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21718->21722 21719->21717 21720->21694 21720->21705 21762 7ff6db5939e0 82 API calls 21720->21762 21724 7ff6db5a799c 21722->21724 21728 7ff6db5a5208 103 API calls 21729 7ff6db5a7836 21728->21729 21729->21716 21816 7ff6db5a4fe8 21729->21816 21732 7ff6db5a5208 103 API calls 21735 7ff6db5a787c 21735->21716 21739 7ff6db5a1bb0 64 API calls 21738->21739 21740 7ff6db5a1db5 21739->21740 21741 7ff6db5961e8 swprintf 46 API calls 21740->21741 21742 7ff6db5a1de6 21741->21742 21743 7ff6db5912bc 33 API calls 21742->21743 21744 7ff6db5a1e11 21743->21744 21745 7ff6db598d18 47 API calls 21744->21745 21746 7ff6db5a1e1e 21745->21746 21747 7ff6db5b5bf0 _handle_error 8 API calls 21746->21747 21748 7ff6db5a1e2e 21747->21748 21748->21694 21750 7ff6db59885c 8 API calls 21749->21750 21751 7ff6db5962a1 21750->21751 21755 7ff6db5962cf 21751->21755 22028 7ff6db59647c 21751->22028 21754 7ff6db5962ba FindClose 21754->21755 21755->21694 21757 7ff6db5a5246 21756->21757 21759 7ff6db5a523c 21756->21759 21757->21759 21760 7ff6db594c40 101 API calls 21757->21760 21758 7ff6db5a526a 21761 7ff6db594d50 101 API calls 21758->21761 21759->21699 21760->21758 21761->21759 21762->21694 21763->21688 21766 7ff6db5b5aa0 4 API calls 21765->21766 21767 7ff6db5a4e32 21766->21767 21823 7ff6db5946a0 21767->21823 21770 7ff6db5a4e90 21770->21716 21772 7ff6db5a9d70 21770->21772 21842 7ff6db594c40 21772->21842 21775 7ff6db5b5bf0 _handle_error 8 API calls 21776 7ff6db5a774b 21775->21776 21783 7ff6db5945f0 21776->21783 21777 7ff6db5a9df6 21780 7ff6db594a70 104 API calls 21777->21780 21778 7ff6db5a9e11 21778->21775 21779 7ff6db594c40 101 API calls 21779->21777 21780->21778 21861 7ff6db594d50 21783->21861 21785 7ff6db594628 21788 7ff6db594d50 101 API calls 21785->21788 21786 7ff6db594638 21789 7ff6db594c40 101 API calls 21786->21789 21787 7ff6db594651 21792 7ff6db5a7170 21787->21792 21788->21786 21789->21787 21791 7ff6db594c40 101 API calls 21791->21785 21793 7ff6db5a7246 21792->21793 21794 7ff6db5a71b2 21792->21794 21805 7ff6db5a72b2 21793->21805 21809 7ff6db594c40 101 API calls 21793->21809 21796 7ff6db5a5378 120 API calls 21794->21796 21795 7ff6db5a7289 21808 7ff6db594d50 101 API calls 21795->21808 21804 7ff6db5a71dd 21796->21804 21797 7ff6db5a740f 21800 7ff6db5b5bf0 _handle_error 8 API calls 21797->21800 21798 7ff6db5a729d 21872 7ff6db5a5378 21798->21872 21799 7ff6db5a4fe8 120 API calls 21806 7ff6db5a744a 21799->21806 21802 7ff6db5a7508 21800->21802 21802->21716 21810 7ff6db5a7f18 21802->21810 21803 7ff6db5a5378 120 API calls 21803->21805 21804->21797 21804->21799 21805->21797 21805->21803 21805->21804 21806->21797 21900 7ff6db5a6f88 21806->21900 21808->21798 21809->21795 21811 7ff6db5a77a3 21810->21811 21812 7ff6db5a7f2c 21810->21812 21811->21716 21811->21728 21812->21811 21990 7ff6db5a4a54 21812->21990 21818 7ff6db5a5010 memcpy_s 21816->21818 21821 7ff6db5a50b4 21816->21821 21817 7ff6db5a5378 120 API calls 21817->21818 21818->21817 21819 7ff6db5a509a 21818->21819 21818->21821 21821->21732 21821->21735 21824 7ff6db5946dd CreateFileW 21823->21824 21826 7ff6db59478e GetLastError 21824->21826 21833 7ff6db59484e 21824->21833 21827 7ff6db5980b0 49 API calls 21826->21827 21828 7ff6db5947bc 21827->21828 21829 7ff6db5947c0 CreateFileW GetLastError 21828->21829 21831 7ff6db59480c 21828->21831 21829->21831 21830 7ff6db5948e8 21834 7ff6db5b5bf0 _handle_error 8 API calls 21830->21834 21831->21833 21838 7ff6db594916 21831->21838 21832 7ff6db594891 SetFileTime 21835 7ff6db5948af 21832->21835 21833->21832 21833->21835 21836 7ff6db5948fb 21834->21836 21835->21830 21837 7ff6db591c80 33 API calls 21835->21837 21836->21770 21841 7ff6db593cd0 100 API calls 2 library calls 21836->21841 21837->21830 21839 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 21838->21839 21840 7ff6db59491b 21839->21840 21841->21770 21852 7ff6db59491c 21842->21852 21845 7ff6db594c67 21847 7ff6db594a70 21845->21847 21848 7ff6db594a96 21847->21848 21850 7ff6db594a9d 21847->21850 21848->21778 21848->21779 21850->21848 21851 7ff6db594520 GetStdHandle ReadFile GetLastError GetLastError GetFileType 21850->21851 21860 7ff6db593d8c 99 API calls Concurrency::cancel_current_task 21850->21860 21851->21850 21858 7ff6db59492d _snwprintf 21852->21858 21853 7ff6db594959 21854 7ff6db5b5bf0 _handle_error 8 API calls 21853->21854 21856 7ff6db5949c1 21854->21856 21855 7ff6db594a34 SetFilePointer 21855->21853 21857 7ff6db594a5c GetLastError 21855->21857 21856->21845 21859 7ff6db593eac 99 API calls Concurrency::cancel_current_task 21856->21859 21857->21853 21858->21853 21858->21855 21862 7ff6db594d6d 21861->21862 21866 7ff6db594d89 21861->21866 21863 7ff6db59460f 21862->21863 21870 7ff6db593eac 99 API calls Concurrency::cancel_current_task 21862->21870 21863->21791 21865 7ff6db594da1 SetFilePointer 21865->21863 21867 7ff6db594dbe GetLastError 21865->21867 21866->21863 21866->21865 21867->21863 21868 7ff6db594dc8 21867->21868 21868->21863 21871 7ff6db593eac 99 API calls Concurrency::cancel_current_task 21868->21871 21899 7ff6db594a70 104 API calls 21872->21899 21873 7ff6db5b5bf0 _handle_error 8 API calls 21874 7ff6db5a562f 21873->21874 21874->21805 21875 7ff6db5a53c4 21876 7ff6db596288 55 API calls 21875->21876 21898 7ff6db5a55dd 21875->21898 21877 7ff6db5a543f 21876->21877 21878 7ff6db5a5467 21877->21878 21879 7ff6db5a54bd 21877->21879 21880 7ff6db5a54bb 21878->21880 21907 7ff6db5a1bb0 21878->21907 21879->21880 21882 7ff6db5a1d8c 64 API calls 21879->21882 21882->21880 21898->21873 21899->21875 21986 7ff6db5a7c84 21900->21986 21903 7ff6db5a4fe8 120 API calls 21906 7ff6db5a6ff7 21903->21906 21904 7ff6db5b5bf0 _handle_error 8 API calls 21905 7ff6db5a714f 21904->21905 21905->21797 21906->21904 21970 7ff6db597af8 47 API calls 21907->21970 21988 7ff6db5a7cd9 memcpy_s 21986->21988 21987 7ff6db5a6fcb 21987->21903 21987->21906 21988->21987 21989 7ff6db594c40 101 API calls 21988->21989 21989->21988 21991 7ff6db5a4a8e 21990->21991 22014 7ff6db5a4a87 21990->22014 21993 7ff6db5a4b14 21991->21993 21999 7ff6db5a4a9b 21991->21999 22001 7ff6db5a4acc 21991->22001 21992 7ff6db5b5bf0 _handle_error 8 API calls 21995 7ff6db5a4d11 21992->21995 22017 7ff6db5a46cc 21993->22017 21994 7ff6db5a5208 103 API calls 21994->22014 21995->21811 22016 7ff6db593834 82 API calls 2 library calls 21995->22016 22000 7ff6db5a4af0 21999->22000 21999->22001 21999->22014 22002 7ff6db5a4fe8 120 API calls 22000->22002 22001->21994 22002->22014 22014->21992 22016->21811 22018 7ff6db5a47a5 22017->22018 22021 7ff6db5a4701 22017->22021 22026 7ff6db591bd4 33 API calls std::_Xinvalid_argument 22018->22026 22029 7ff6db596592 FindNextFileW 22028->22029 22030 7ff6db5964b9 FindFirstFileW 22028->22030 22032 7ff6db5965a1 GetLastError 22029->22032 22033 7ff6db5965b3 22029->22033 22030->22033 22034 7ff6db5964de 22030->22034 22052 7ff6db596580 22032->22052 22035 7ff6db5965d1 22033->22035 22038 7ff6db591c80 33 API calls 22033->22038 22036 7ff6db5980b0 49 API calls 22034->22036 22042 7ff6db5912bc 33 API calls 22035->22042 22037 7ff6db596504 22036->22037 22040 7ff6db596508 FindFirstFileW 22037->22040 22043 7ff6db596527 22037->22043 22038->22035 22039 7ff6db5b5bf0 _handle_error 8 API calls 22041 7ff6db5962b4 22039->22041 22040->22043 22041->21754 22041->21755 22044 7ff6db5965fb 22042->22044 22043->22033 22045 7ff6db59656f GetLastError 22043->22045 22047 7ff6db5966d4 22043->22047 22054 7ff6db598dc4 22044->22054 22045->22052 22049 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22047->22049 22050 7ff6db5966da 22049->22050 22051 7ff6db5966cf 22053 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22051->22053 22052->22039 22053->22047 22055 7ff6db598dd9 22054->22055 22058 7ff6db598f28 22055->22058 22057 7ff6db596609 22057->22051 22057->22052 22059 7ff6db5990c6 22058->22059 22062 7ff6db598f5a 22058->22062 22066 7ff6db59353c 47 API calls 22059->22066 22064 7ff6db598f74 memcpy_s 22062->22064 22065 7ff6db596edc 33 API calls 2 library calls 22062->22065 22064->22057 22065->22064 22068 7ff6db5ac11c 4 API calls 22067->22068 22069 7ff6db5ac0fa 22068->22069 22070 7ff6db5ac109 22069->22070 22079 7ff6db5ac154 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 22069->22079 22070->21058 22070->21059 22072->21064 22073->21070 22075 7ff6db5ac12e 22074->22075 22076 7ff6db5ac133 22074->22076 22080 7ff6db5ac18c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 22075->22080 22076->21070 22078->21073 22079->22070 22080->22076 22099 7ff6db59d3f8 22083->22099 22087 7ff6db5bd308 swprintf 46 API calls 22088 7ff6db59d80d _snwprintf 22087->22088 22088->22087 22095 7ff6db59d89c 22088->22095 22113 7ff6db593550 33 API calls 22088->22113 22089 7ff6db59d8cb 22091 7ff6db59d93f 22089->22091 22094 7ff6db59d967 22089->22094 22092 7ff6db5b5bf0 _handle_error 8 API calls 22091->22092 22093 7ff6db59d953 22092->22093 22093->20536 22096 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22094->22096 22095->22089 22114 7ff6db593550 33 API calls 22095->22114 22097 7ff6db59d96c 22096->22097 22100 7ff6db59d58d 22099->22100 22102 7ff6db59d42a 22099->22102 22103 7ff6db59ca18 22100->22103 22101 7ff6db591734 33 API calls 22101->22102 22102->22100 22102->22101 22104 7ff6db59ca4e 22103->22104 22110 7ff6db59cb18 22103->22110 22105 7ff6db59ca5e 22104->22105 22108 7ff6db59cb13 22104->22108 22111 7ff6db59cab8 22104->22111 22105->22088 22115 7ff6db591b50 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 22108->22115 22116 7ff6db591bd4 33 API calls std::_Xinvalid_argument 22110->22116 22111->22105 22112 7ff6db5b5aa0 4 API calls 22111->22112 22112->22105 22113->22088 22114->22089 22117->21126 22119->21149 22120->21156 22122->21161 22124->21167 22129 7ff6db5a79a0 22130 7ff6db5a4fe8 120 API calls 22129->22130 22133 7ff6db5a79c5 22130->22133 22131 7ff6db5b5bf0 _handle_error 8 API calls 22132 7ff6db5a7b34 22131->22132 22133->22131 22379 7ff6db5b4936 14 API calls _com_raise_error 22484 7ff6db5a47ac 22485 7ff6db598e0c 33 API calls 22484->22485 22486 7ff6db5a47f1 22485->22486 22487 7ff6db596288 55 API calls 22486->22487 22488 7ff6db5a4822 22487->22488 22489 7ff6db5a48c5 22488->22489 22492 7ff6db5a48ed 22488->22492 22496 7ff6db5a48f2 22488->22496 22490 7ff6db5b5bf0 _handle_error 8 API calls 22489->22490 22493 7ff6db5a48d8 22490->22493 22491 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22494 7ff6db5a48f8 22491->22494 22495 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22492->22495 22495->22496 22496->22491 22506 7ff6db597644 22528 7ff6db597686 22506->22528 22507 7ff6db5978e7 22509 7ff6db5b5bf0 _handle_error 8 API calls 22507->22509 22508 7ff6db59791a 22533 7ff6db59353c 47 API calls 22508->22533 22510 7ff6db5978fc 22509->22510 22512 7ff6db5912bc 33 API calls 22514 7ff6db597875 22512->22514 22517 7ff6db591b70 31 API calls 22514->22517 22519 7ff6db597887 memcpy_s 22514->22519 22517->22519 22519->22507 22522 7ff6db597915 22519->22522 22524 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22522->22524 22524->22508 22528->22507 22528->22508 22528->22512 22138 7ff6db5c0e1c 22139 7ff6db5c0e67 22138->22139 22143 7ff6db5c0e2b abort 22138->22143 22145 7ff6db5c0b6c 15 API calls _invalid_parameter_noinfo_noreturn 22139->22145 22140 7ff6db5c0e4e RtlAllocateHeap 22142 7ff6db5c0e65 22140->22142 22140->22143 22143->22139 22143->22140 22144 7ff6db5bf088 abort 2 API calls 22143->22144 22144->22143 22145->22142 22172 7ff6db59e71c 22175 7ff6db59e77c SystemTimeToFileTime 22172->22175 22176 7ff6db59e7ee 22175->22176 22177 7ff6db59e873 22175->22177 22184 7ff6db596768 22176->22184 22179 7ff6db5b5bf0 _handle_error 8 API calls 22177->22179 22181 7ff6db59e777 22179->22181 22182 7ff6db59e7fe LocalFileTimeToFileTime 22182->22177 22183 7ff6db59e80a FileTimeToSystemTime TzSpecificLocalTimeToSystemTime SystemTimeToFileTime SystemTimeToFileTime 22183->22177 22185 7ff6db59678c GetVersionExW 22184->22185 22186 7ff6db5967bf 22184->22186 22185->22186 22187 7ff6db5b5bf0 _handle_error 8 API calls 22186->22187 22188 7ff6db5967ec 22187->22188 22188->22182 22188->22183 22189 7ff6db5a3e1c 22190 7ff6db5a3e7e 22189->22190 22193 7ff6db5a3ec1 22189->22193 22240 7ff6db5a4ea0 22190->22240 22194 7ff6db5a3f70 22193->22194 22195 7ff6db5a3f1e 22193->22195 22238 7ff6db5945f0 103 API calls 22193->22238 22197 7ff6db5a3f9c 22194->22197 22228 7ff6db5a4005 22194->22228 22195->22194 22239 7ff6db594c40 101 API calls 22195->22239 22196 7ff6db59552c 56 API calls 22198 7ff6db5a3e99 22196->22198 22199 7ff6db5a3fdf 22197->22199 22203 7ff6db5a3fa6 22197->22203 22201 7ff6db5a4ea0 59 API calls 22198->22201 22257 7ff6db5a5b1c 22199->22257 22200 7ff6db5a3f48 22256 7ff6db594e00 SetEndOfFile 22200->22256 22205 7ff6db5a3e9e 22201->22205 22290 7ff6db594160 82 API calls 22203->22290 22205->22193 22208 7ff6db5a3ea2 22205->22208 22207 7ff6db5a3f54 22237 7ff6db594c40 101 API calls 22207->22237 22289 7ff6db593a9c 99 API calls 22208->22289 22211 7ff6db5a40e8 22212 7ff6db5a3fed 22211->22212 22277 7ff6db5a4d30 22211->22277 22216 7ff6db5a4124 22212->22216 22294 7ff6db593c7c 82 API calls 22212->22294 22213 7ff6db5b5bf0 _handle_error 8 API calls 22217 7ff6db5a42ac 22213->22217 22214 7ff6db5a3fbc 22218 7ff6db5a48fc 106 API calls 22214->22218 22231 7ff6db5a3eb8 22214->22231 22236 7ff6db5a41b9 22216->22236 22295 7ff6db5a8d74 8 API calls 22216->22295 22221 7ff6db5a3fcf 22218->22221 22223 7ff6db595790 51 API calls 22221->22223 22223->22231 22224 7ff6db5a4200 22225 7ff6db5a427d 22224->22225 22226 7ff6db5a428b 22224->22226 22297 7ff6db594e00 SetEndOfFile 22224->22297 22225->22226 22281 7ff6db5a48fc 22225->22281 22226->22231 22232 7ff6db595790 51 API calls 22226->22232 22228->22211 22233 7ff6db5a4d30 104 API calls 22228->22233 22268 7ff6db5a50d8 22228->22268 22291 7ff6db5a00ac 22228->22291 22231->22213 22232->22231 22233->22228 22234 7ff6db5a414a 22235 7ff6db5a50d8 120 API calls 22234->22235 22234->22236 22235->22234 22236->22224 22296 7ff6db5938e0 82 API calls 2 library calls 22236->22296 22237->22194 22238->22195 22239->22200 22241 7ff6db596288 55 API calls 22240->22241 22242 7ff6db5a4efe 22241->22242 22243 7ff6db5a4f17 22242->22243 22245 7ff6db5a4f0f 22242->22245 22244 7ff6db5b5aa0 4 API calls 22243->22244 22247 7ff6db5a4f21 22244->22247 22298 7ff6db595db0 51 API calls 2 library calls 22245->22298 22248 7ff6db594334 51 API calls 22247->22248 22249 7ff6db5a4f50 22248->22249 22250 7ff6db5a4fb7 22249->22250 22252 7ff6db5a4fdf 22249->22252 22251 7ff6db5b5bf0 _handle_error 8 API calls 22250->22251 22253 7ff6db5a3e83 22251->22253 22254 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22252->22254 22253->22193 22253->22196 22255 7ff6db5a4fe4 22254->22255 22256->22207 22262 7ff6db5a5b55 22257->22262 22258 7ff6db5a50d8 120 API calls 22258->22262 22262->22258 22263 7ff6db5a00ac SendDlgItemMessageW 22262->22263 22264 7ff6db5a5d4d 22262->22264 22265 7ff6db5a5dca 22262->22265 22267 7ff6db594d50 101 API calls 22262->22267 22299 7ff6db5a6250 22262->22299 22321 7ff6db5a6b1c 22262->22321 22330 7ff6db5a6958 22262->22330 22263->22262 22264->22265 22266 7ff6db5a4d30 104 API calls 22264->22266 22265->22212 22266->22265 22267->22262 22269 7ff6db5a50f3 22268->22269 22275 7ff6db5a50eb 22268->22275 22270 7ff6db5a5378 120 API calls 22269->22270 22272 7ff6db5a5146 22269->22272 22269->22275 22271 7ff6db5a5132 22270->22271 22271->22272 22274 7ff6db5a519d 22271->22274 22271->22275 22272->22275 22349 7ff6db5a8d2c 8 API calls 22272->22349 22350 7ff6db593df0 99 API calls 2 library calls 22274->22350 22275->22228 22279 7ff6db5a4d69 22277->22279 22278 7ff6db5a4d8f 22278->22212 22279->22278 22351 7ff6db594e18 22279->22351 22282 7ff6db5a4916 22281->22282 22287 7ff6db5a496e 22281->22287 22372 7ff6db594c70 22282->22372 22284 7ff6db5a495a 22288 7ff6db5942d0 100 API calls 22284->22288 22285 7ff6db5a49e9 22285->22226 22286 7ff6db595ff4 51 API calls 22286->22285 22287->22285 22287->22286 22288->22287 22289->22231 22290->22214 22291->22228 22292 7ff6db5b3a40 22291->22292 22293 7ff6db5b3a4f SendDlgItemMessageW 22292->22293 22294->22216 22295->22234 22296->22224 22297->22225 22298->22243 22301 7ff6db5a62a7 __scrt_get_show_window_mode 22299->22301 22300 7ff6db5a50d8 120 API calls 22300->22301 22301->22300 22303 7ff6db5a62f9 22301->22303 22302 7ff6db5a50d8 120 API calls 22302->22303 22303->22302 22305 7ff6db5a635b 22303->22305 22320 7ff6db5a64c6 22303->22320 22304 7ff6db5b5bf0 _handle_error 8 API calls 22306 7ff6db5a6937 22304->22306 22307 7ff6db5a50d8 120 API calls 22305->22307 22310 7ff6db5a63b4 22305->22310 22305->22320 22306->22262 22307->22305 22308 7ff6db5a645e 22340 7ff6db5a5658 22308->22340 22310->22308 22311 7ff6db5a50d8 120 API calls 22310->22311 22310->22320 22311->22310 22312 7ff6db5a64bc 22313 7ff6db5a6708 22312->22313 22315 7ff6db5a50d8 120 API calls 22312->22315 22312->22320 22314 7ff6db5a5658 8 API calls 22313->22314 22316 7ff6db5a677c 22314->22316 22315->22312 22317 7ff6db5a5658 8 API calls 22316->22317 22316->22320 22318 7ff6db5a6852 22317->22318 22318->22320 22344 7ff6db5a5e00 22318->22344 22320->22304 22324 7ff6db5a6b64 22321->22324 22322 7ff6db5a50d8 120 API calls 22322->22324 22323 7ff6db5a6b9b 22325 7ff6db5a6baa 22323->22325 22326 7ff6db5a50d8 120 API calls 22323->22326 22329 7ff6db5a6be9 22323->22329 22324->22322 22324->22323 22325->22262 22326->22323 22327 7ff6db5a50d8 120 API calls 22327->22329 22328 7ff6db5a4d30 104 API calls 22328->22329 22329->22325 22329->22327 22329->22328 22331 7ff6db5a6a70 22330->22331 22332 7ff6db5a6989 22330->22332 22333 7ff6db5a5e00 125 API calls 22331->22333 22335 7ff6db5a6a14 22331->22335 22334 7ff6db5a5658 8 API calls 22332->22334 22333->22335 22336 7ff6db5a6a10 22334->22336 22337 7ff6db5b5bf0 _handle_error 8 API calls 22335->22337 22336->22335 22338 7ff6db5a5658 8 API calls 22336->22338 22339 7ff6db5a6ad1 22337->22339 22338->22331 22339->22262 22343 7ff6db5a56ba __scrt_get_show_window_mode 22340->22343 22341 7ff6db5b5bf0 _handle_error 8 API calls 22342 7ff6db5a5aa5 22341->22342 22342->22312 22343->22341 22347 7ff6db5a5e63 22344->22347 22345 7ff6db5a621c 22345->22320 22346 7ff6db5a4d30 104 API calls 22346->22347 22347->22345 22347->22346 22348 7ff6db5a50d8 120 API calls 22347->22348 22348->22347 22350->22275 22352 7ff6db594e4b 22351->22352 22358 7ff6db594e44 22351->22358 22353 7ff6db594e55 GetStdHandle 22352->22353 22359 7ff6db594e63 22352->22359 22353->22359 22354 7ff6db5b5bf0 _handle_error 8 API calls 22355 7ff6db594fee 22354->22355 22355->22278 22356 7ff6db594ebe WriteFile 22356->22359 22357 7ff6db594e7e WriteFile 22357->22359 22360 7ff6db594eb4 22357->22360 22358->22354 22359->22356 22359->22357 22359->22358 22362 7ff6db594f56 22359->22362 22370 7ff6db593a18 101 API calls 22359->22370 22360->22357 22360->22359 22363 7ff6db5912bc 33 API calls 22362->22363 22364 7ff6db594f85 22363->22364 22371 7ff6db594190 99 API calls Concurrency::cancel_current_task 22364->22371 22370->22359 22373 7ff6db594c94 22372->22373 22376 7ff6db594ca4 22372->22376 22374 7ff6db594c9a FlushFileBuffers 22373->22374 22373->22376 22374->22376 22375 7ff6db594d0e SetFileTime 22375->22284 22376->22375 22560 7ff6db5b64fc 22583 7ff6db5b5f84 22560->22583 22563 7ff6db5b6648 22698 7ff6db5b6900 7 API calls 2 library calls 22563->22698 22565 7ff6db5b6518 __scrt_acquire_startup_lock 22566 7ff6db5b6652 22565->22566 22572 7ff6db5b6536 __scrt_release_startup_lock 22565->22572 22699 7ff6db5b6900 7 API calls 2 library calls 22566->22699 22568 7ff6db5b655b 22569 7ff6db5b665d abort 22570 7ff6db5b65e1 22591 7ff6db5b6a4c 22570->22591 22572->22568 22572->22570 22695 7ff6db5bf4f0 35 API calls __GSHandlerCheck_EH 22572->22695 22573 7ff6db5b65e6 22594 7ff6db5c01c0 22573->22594 22580 7ff6db5b6609 22580->22569 22697 7ff6db5b6118 7 API calls __scrt_initialize_crt 22580->22697 22582 7ff6db5b6620 22582->22568 22700 7ff6db5b6740 22583->22700 22586 7ff6db5b5fb3 22702 7ff6db5c00f0 22586->22702 22589 7ff6db5b5faf 22589->22563 22589->22565 22719 7ff6db5b7480 22591->22719 22721 7ff6db5c3b80 22594->22721 22596 7ff6db5c01cf 22597 7ff6db5b65ee 22596->22597 22725 7ff6db5c3f10 35 API calls _snwprintf 22596->22725 22599 7ff6db5b3fcc 22597->22599 22600 7ff6db5b4006 22599->22600 22601 7ff6db597a28 35 API calls 22600->22601 22602 7ff6db5b4012 22601->22602 22727 7ff6db5ad068 22602->22727 22604 7ff6db5b401c __scrt_get_show_window_mode 22732 7ff6db5ad6e4 22604->22732 22606 7ff6db5b41e6 GetCommandLineW 22609 7ff6db5b41f8 22606->22609 22658 7ff6db5b43ba 22606->22658 22607 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22608 7ff6db5b465a 22607->22608 22612 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22608->22612 22614 7ff6db5912bc 33 API calls 22609->22614 22610 7ff6db597c10 34 API calls 22613 7ff6db5b43c9 22610->22613 22611 7ff6db5b4091 22611->22606 22668 7ff6db5b4654 22611->22668 22627 7ff6db5b4660 22612->22627 22615 7ff6db5b43e0 memcpy_s 22613->22615 22618 7ff6db591b70 31 API calls 22613->22618 22617 7ff6db5b421d 22614->22617 22616 7ff6db591b70 31 API calls 22615->22616 22619 7ff6db5b440b SetEnvironmentVariableW GetLocalTime 22616->22619 22742 7ff6db5b05e0 22617->22742 22618->22615 22622 7ff6db5961e8 swprintf 46 API calls 22619->22622 22621 7ff6db59bbf4 shared_ptr 31 API calls 22645 7ff6db5b46de 22621->22645 22625 7ff6db5b4490 SetEnvironmentVariableW GetModuleHandleW LoadIconW 22622->22625 22623 7ff6db5b4909 22626 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22623->22626 22624 7ff6db5b4227 22624->22608 22629 7ff6db5b4271 OpenFileMappingW 22624->22629 22630 7ff6db5b4353 22624->22630 22773 7ff6db5aeb24 LoadBitmapW 22625->22773 22638 7ff6db5b4929 22626->22638 22627->22621 22627->22623 22632 7ff6db5b4291 MapViewOfFile 22629->22632 22633 7ff6db5b4348 CloseHandle 22629->22633 22640 7ff6db5912bc 33 API calls 22630->22640 22632->22633 22636 7ff6db5b42b7 UnmapViewOfFile MapViewOfFile 22632->22636 22633->22658 22634 7ff6db5b5350 _com_raise_error 14 API calls 22634->22638 22636->22633 22637 7ff6db5b42e9 22636->22637 22826 7ff6db5adcc8 33 API calls 2 library calls 22637->22826 22638->22634 22639 7ff6db5b44ed 22797 7ff6db5aa3f0 22639->22797 22642 7ff6db5b4378 22640->22642 22641 7ff6db591b70 31 API calls 22646 7ff6db5b489d 22641->22646 22760 7ff6db5b37d0 22642->22760 22645->22623 22645->22641 22650 7ff6db591b70 31 API calls 22646->22650 22648 7ff6db5b42f9 22652 7ff6db5b37d0 35 API calls 22648->22652 22654 7ff6db5b48a9 22650->22654 22655 7ff6db5b4308 22652->22655 22653 7ff6db5aa3f0 4 API calls 22656 7ff6db5b44ff DialogBoxParamW 22653->22656 22657 7ff6db591b70 31 API calls 22654->22657 22827 7ff6db59bd2c 131 API calls 22655->22827 22669 7ff6db5b454b 22656->22669 22660 7ff6db5b48b5 22657->22660 22658->22610 22663 7ff6db591b70 31 API calls 22660->22663 22661 7ff6db5b464f 22665 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22661->22665 22662 7ff6db5b431d 22828 7ff6db59be78 131 API calls shared_ptr 22662->22828 22666 7ff6db5b48c1 22663->22666 22665->22668 22672 7ff6db591b70 31 API calls 22666->22672 22667 7ff6db5b4330 22675 7ff6db5b433f UnmapViewOfFile 22667->22675 22668->22607 22670 7ff6db5b455e Sleep 22669->22670 22671 7ff6db5b4564 22669->22671 22670->22671 22673 7ff6db5b4572 shared_ptr 22671->22673 22800 7ff6db5ada84 22671->22800 22674 7ff6db5b48cd 22672->22674 22678 7ff6db5b457e DeleteObject 22673->22678 22677 7ff6db591b70 31 API calls 22674->22677 22675->22633 22679 7ff6db5b48d9 22677->22679 22680 7ff6db5b4597 DeleteObject 22678->22680 22681 7ff6db5b459d 22678->22681 22682 7ff6db591b70 31 API calls 22679->22682 22680->22681 22684 7ff6db5b45d3 22681->22684 22691 7ff6db5b45e5 22681->22691 22683 7ff6db5b48e5 22682->22683 22685 7ff6db591b70 31 API calls 22683->22685 22686 7ff6db5b38e8 5 API calls 22684->22686 22687 7ff6db5b48f1 22685->22687 22689 7ff6db5b45d8 CloseHandle 22686->22689 22688 7ff6db591b70 31 API calls 22687->22688 22690 7ff6db5b48fd 22688->22690 22689->22691 22692 7ff6db591b70 31 API calls 22690->22692 22693 7ff6db5b5bf0 _handle_error 8 API calls 22691->22693 22692->22623 22694 7ff6db5b4632 22693->22694 22696 7ff6db5b6a90 GetModuleHandleW 22694->22696 22695->22570 22696->22580 22697->22582 22698->22566 22699->22569 22701 7ff6db5b5fa6 __scrt_dllmain_crt_thread_attach 22700->22701 22701->22586 22701->22589 22703 7ff6db5c419c 22702->22703 22704 7ff6db5b5fb8 22703->22704 22707 7ff6db5c20d0 22703->22707 22704->22589 22706 7ff6db5b83a0 7 API calls 2 library calls 22704->22706 22706->22589 22718 7ff6db5c27e8 EnterCriticalSection 22707->22718 22720 7ff6db5b6a63 GetStartupInfoW 22719->22720 22720->22573 22722 7ff6db5c3b99 22721->22722 22723 7ff6db5c3b8d 22721->22723 22722->22596 22726 7ff6db5c39c0 48 API calls 4 library calls 22723->22726 22725->22596 22726->22722 22829 7ff6db59dc08 22727->22829 22729 7ff6db5ad07d OleInitialize 22730 7ff6db5ad0a3 22729->22730 22731 7ff6db5ad0c9 SHGetMalloc 22730->22731 22731->22604 22733 7ff6db5ad719 22732->22733 22736 7ff6db5ad71e memcpy_s 22732->22736 22734 7ff6db591b70 31 API calls 22733->22734 22734->22736 22735 7ff6db591b70 31 API calls 22737 7ff6db5ad74d memcpy_s 22735->22737 22736->22735 22736->22737 22738 7ff6db591b70 31 API calls 22737->22738 22739 7ff6db5ad77c memcpy_s 22737->22739 22738->22739 22740 7ff6db591b70 31 API calls 22739->22740 22741 7ff6db5ad7ab memcpy_s 22739->22741 22740->22741 22741->22611 22743 7ff6db59cf94 33 API calls 22742->22743 22757 7ff6db5b062f memcpy_s 22743->22757 22744 7ff6db5b089b 22745 7ff6db5b08ce 22744->22745 22749 7ff6db5b08f4 22744->22749 22746 7ff6db5b5bf0 _handle_error 8 API calls 22745->22746 22747 7ff6db5b08df 22746->22747 22747->22624 22748 7ff6db59cf94 33 API calls 22748->22757 22750 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22749->22750 22751 7ff6db5b08f9 22750->22751 22951 7ff6db59353c 47 API calls 22751->22951 22752 7ff6db5b08ff 22952 7ff6db59353c 47 API calls 22752->22952 22757->22744 22757->22748 22757->22749 22757->22751 22757->22752 22758 7ff6db591b70 31 API calls 22757->22758 22759 7ff6db5912bc 33 API calls 22757->22759 22950 7ff6db59be78 131 API calls shared_ptr 22757->22950 22758->22757 22759->22757 22761 7ff6db5b3800 SetEnvironmentVariableW 22760->22761 22762 7ff6db5b37fd 22760->22762 22763 7ff6db59cf94 33 API calls 22761->22763 22762->22761 22770 7ff6db5b3838 22763->22770 22764 7ff6db5b3887 22765 7ff6db5b38be 22764->22765 22767 7ff6db5b38df 22764->22767 22766 7ff6db5b5bf0 _handle_error 8 API calls 22765->22766 22768 7ff6db5b38cf 22766->22768 22769 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22767->22769 22768->22658 22768->22661 22771 7ff6db5b38e4 22769->22771 22770->22764 22772 7ff6db5b3871 SetEnvironmentVariableW 22770->22772 22772->22764 22774 7ff6db5aeb4e 22773->22774 22778 7ff6db5aeb56 22773->22778 22953 7ff6db5ac220 FindResourceW 22774->22953 22775 7ff6db5aeb5e GetObjectW 22777 7ff6db5aeb73 22775->22777 22779 7ff6db5ac0ec 4 API calls 22777->22779 22778->22775 22778->22777 22780 7ff6db5aeb88 22779->22780 22781 7ff6db5aebde 22780->22781 22782 7ff6db5aebae 22780->22782 22783 7ff6db5ac220 9 API calls 22780->22783 22792 7ff6db599cac 22781->22792 22965 7ff6db5ac154 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 22782->22965 22785 7ff6db5aeb9a 22783->22785 22785->22782 22787 7ff6db5aeba2 DeleteObject 22785->22787 22786 7ff6db5aebb7 22788 7ff6db5ac11c 4 API calls 22786->22788 22787->22782 22789 7ff6db5aebc2 22788->22789 22966 7ff6db5ac9f0 16 API calls _handle_error 22789->22966 22791 7ff6db5aebcf DeleteObject 22791->22781 22967 7ff6db599cdc 22792->22967 22794 7ff6db599cba 23034 7ff6db59a83c GetModuleHandleW FindResourceW 22794->23034 22796 7ff6db599cc2 22796->22639 22798 7ff6db5b5aa0 4 API calls 22797->22798 22799 7ff6db5aa436 22798->22799 22799->22653 22801 7ff6db5adaca 22800->22801 22817 7ff6db5adb36 22800->22817 22803 7ff6db5912bc 33 API calls 22801->22803 22802 7ff6db591b70 31 API calls 22805 7ff6db5adb51 22802->22805 22804 7ff6db5adaf4 22803->22804 22806 7ff6db598b28 47 API calls 22804->22806 22808 7ff6db598cf8 SetCurrentDirectoryW 22805->22808 22822 7ff6db5adc8e 22805->22822 22825 7ff6db5adcc1 22805->22825 22809 7ff6db5adb08 22806->22809 22807 7ff6db5b5bf0 _handle_error 8 API calls 22810 7ff6db5adc9f 22807->22810 22811 7ff6db5adbac 22808->22811 23057 7ff6db5a0a8c CompareStringW 22809->23057 22810->22673 22812 7ff6db592314 33 API calls 22811->22812 22815 7ff6db5adbdb 22812->22815 22813 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22816 7ff6db5adcc7 22813->22816 22818 7ff6db5adbe6 22815->22818 23058 7ff6db591734 33 API calls 4 library calls 22815->23058 22817->22802 22817->22805 22819 7ff6db5adc15 SHFileOperationW 22818->22819 22821 7ff6db5adc61 22819->22821 22819->22822 22821->22822 22823 7ff6db5adcbc 22821->22823 22822->22807 22824 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22823->22824 22824->22825 22825->22813 22826->22648 22827->22662 22828->22667 22830 7ff6db5913c4 33 API calls 22829->22830 22831 7ff6db59dc50 GetSystemDirectoryW 22830->22831 22832 7ff6db59dc75 22831->22832 22850 7ff6db59dc6e 22831->22850 22835 7ff6db5912bc 33 API calls 22832->22835 22833 7ff6db59de08 22834 7ff6db5b5bf0 _handle_error 8 API calls 22833->22834 22836 7ff6db59de1c 22834->22836 22837 7ff6db59dcad 22835->22837 22836->22729 22841 7ff6db5912bc 33 API calls 22837->22841 22838 7ff6db59de35 22839 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22838->22839 22840 7ff6db59de3a 22839->22840 22842 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22840->22842 22843 7ff6db59dcd5 22841->22843 22844 7ff6db59de40 22842->22844 22845 7ff6db5988f8 33 API calls 22843->22845 22846 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22844->22846 22849 7ff6db59dce7 22845->22849 22848 7ff6db59de46 22846->22848 22847 7ff6db59dd71 LoadLibraryW 22847->22850 22851 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22848->22851 22849->22840 22849->22844 22849->22847 22850->22833 22850->22838 22850->22848 22852 7ff6db59de4c _snwprintf 22851->22852 22853 7ff6db59de74 GetModuleHandleW 22852->22853 22854 7ff6db59dea6 GetProcAddress 22853->22854 22855 7ff6db59defb 22853->22855 22856 7ff6db59ded3 GetProcAddress 22854->22856 22857 7ff6db59debb 22854->22857 22858 7ff6db59e383 22855->22858 22938 7ff6db5bebfc 39 API calls 2 library calls 22855->22938 22856->22855 22860 7ff6db59dee8 22856->22860 22857->22856 22859 7ff6db597c10 34 API calls 22858->22859 22862 7ff6db59e38c 22859->22862 22860->22855 22864 7ff6db598b28 47 API calls 22862->22864 22863 7ff6db59e230 22863->22858 22865 7ff6db59e23a 22863->22865 22895 7ff6db59e39a 22864->22895 22866 7ff6db597c10 34 API calls 22865->22866 22867 7ff6db59e243 CreateFileW 22866->22867 22868 7ff6db59e370 CloseHandle 22867->22868 22869 7ff6db59e283 SetFilePointer 22867->22869 22872 7ff6db591b70 31 API calls 22868->22872 22869->22868 22871 7ff6db59e29c ReadFile 22869->22871 22870 7ff6db596768 9 API calls 22870->22895 22871->22868 22873 7ff6db59e2c4 22871->22873 22872->22858 22874 7ff6db59e680 22873->22874 22875 7ff6db59e2d8 22873->22875 22947 7ff6db5b5db4 8 API calls 22874->22947 22880 7ff6db5912bc 33 API calls 22875->22880 22876 7ff6db59dc08 77 API calls 22876->22895 22878 7ff6db5912bc 33 API calls 22878->22895 22879 7ff6db59e3be CompareStringW 22879->22895 22886 7ff6db59e30f 22880->22886 22881 7ff6db598dc4 47 API calls 22881->22895 22882 7ff6db591b70 31 API calls 22882->22895 22884 7ff6db59e642 22888 7ff6db591b70 31 API calls 22884->22888 22885 7ff6db59e4c8 22943 7ff6db598be4 47 API calls 22885->22943 22892 7ff6db59e35b 22886->22892 22896 7ff6db59dc08 77 API calls 22886->22896 22939 7ff6db59cf94 22886->22939 22894 7ff6db59e64b 22888->22894 22889 7ff6db595890 51 API calls 22889->22895 22890 7ff6db59e6ab 22898 7ff6db59e6c5 SetThreadExecutionState 22890->22898 22949 7ff6db593b84 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 22890->22949 22891 7ff6db59e685 22891->22890 22948 7ff6db593b84 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 22891->22948 22899 7ff6db591b70 31 API calls 22892->22899 22893 7ff6db59e4d1 22901 7ff6db596768 9 API calls 22893->22901 22903 7ff6db591b70 31 API calls 22894->22903 22895->22870 22895->22876 22895->22878 22895->22879 22895->22881 22895->22882 22895->22889 22907 7ff6db59e44c 22895->22907 22896->22886 22900 7ff6db59e365 22899->22900 22905 7ff6db591b70 31 API calls 22900->22905 22906 7ff6db59e4d6 22901->22906 22902 7ff6db5912bc 33 API calls 22902->22907 22908 7ff6db59e655 22903->22908 22905->22868 22909 7ff6db59e4e1 22906->22909 22910 7ff6db59e586 22906->22910 22907->22902 22911 7ff6db598dc4 47 API calls 22907->22911 22918 7ff6db591b70 31 API calls 22907->22918 22922 7ff6db595890 51 API calls 22907->22922 22928 7ff6db59e4ba 22907->22928 22912 7ff6db5b5bf0 _handle_error 8 API calls 22908->22912 22913 7ff6db59dc08 77 API calls 22909->22913 22914 7ff6db59d9c0 48 API calls 22910->22914 22911->22907 22915 7ff6db59e664 22912->22915 22916 7ff6db59e4ed 22913->22916 22917 7ff6db59e5cb AllocConsole 22914->22917 22915->22729 22919 7ff6db59dc08 77 API calls 22916->22919 22920 7ff6db59e5d5 GetCurrentProcessId AttachConsole 22917->22920 22937 7ff6db59e57b 22917->22937 22918->22907 22921 7ff6db59e4f9 22919->22921 22925 7ff6db59e5ec 22920->22925 22924 7ff6db59aee0 48 API calls 22921->22924 22922->22907 22927 7ff6db59e525 22924->22927 22930 7ff6db59e5f8 GetStdHandle WriteConsoleW Sleep FreeConsole 22925->22930 22926 7ff6db59e639 ExitProcess 22929 7ff6db59d9c0 48 API calls 22927->22929 22928->22884 22928->22885 22931 7ff6db59e543 22929->22931 22930->22937 22932 7ff6db59aee0 48 API calls 22931->22932 22933 7ff6db59e54e 22932->22933 22944 7ff6db59db54 33 API calls 22933->22944 22935 7ff6db59e55a 22945 7ff6db5919d0 31 API calls _invalid_parameter_noinfo_noreturn 22935->22945 22946 7ff6db5919d0 31 API calls _invalid_parameter_noinfo_noreturn 22937->22946 22938->22863 22941 7ff6db59cfc6 22939->22941 22940 7ff6db59cffa 22940->22886 22941->22940 22942 7ff6db591734 33 API calls 22941->22942 22942->22941 22943->22893 22944->22935 22945->22937 22946->22926 22947->22891 22948->22890 22949->22898 22950->22757 22954 7ff6db5ac397 22953->22954 22955 7ff6db5ac24b SizeofResource 22953->22955 22954->22778 22955->22954 22956 7ff6db5ac265 LoadResource 22955->22956 22956->22954 22957 7ff6db5ac27e LockResource 22956->22957 22957->22954 22958 7ff6db5ac293 GlobalAlloc 22957->22958 22958->22954 22959 7ff6db5ac2b4 GlobalLock 22958->22959 22960 7ff6db5ac38e GlobalFree 22959->22960 22962 7ff6db5ac2c6 memcpy_s 22959->22962 22960->22954 22961 7ff6db5ac385 GlobalUnlock 22961->22960 22962->22961 22963 7ff6db5ac36e 22962->22963 22964 7ff6db5ac356 GdipCreateHBITMAPFromBitmap 22962->22964 22963->22961 22964->22963 22965->22786 22966->22791 22970 7ff6db599cfe _snwprintf 22967->22970 22968 7ff6db599d73 23044 7ff6db59806c 48 API calls 22968->23044 22970->22968 22972 7ff6db599e89 22970->22972 22971 7ff6db591b70 31 API calls 22974 7ff6db599dfd 22971->22974 22972->22974 22975 7ff6db591c80 33 API calls 22972->22975 22973 7ff6db599d7d memcpy_s 22973->22971 23032 7ff6db59a82e 22973->23032 22977 7ff6db5946a0 54 API calls 22974->22977 22975->22974 22976 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22978 7ff6db59a834 22976->22978 22979 7ff6db599e1a 22977->22979 22981 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22978->22981 22980 7ff6db599e22 22979->22980 22989 7ff6db599ead 22979->22989 22982 7ff6db59424c 100 API calls 22980->22982 22984 7ff6db59a83a 22981->22984 22985 7ff6db599e2b 22982->22985 22983 7ff6db599f17 23036 7ff6db5bd7c0 22983->23036 22985->22978 22988 7ff6db599e66 22985->22988 22991 7ff6db5b5bf0 _handle_error 8 API calls 22988->22991 22989->22983 22993 7ff6db599254 33 API calls 22989->22993 22990 7ff6db5bd7c0 31 API calls 23004 7ff6db599f57 __vcrt_FlsAlloc 22990->23004 22992 7ff6db59a80e 22991->22992 22992->22794 22993->22989 22994 7ff6db59a089 22995 7ff6db594c40 101 API calls 22994->22995 23007 7ff6db59a15c 22994->23007 22998 7ff6db59a0a1 22995->22998 22996 7ff6db594d50 101 API calls 22996->23004 22997 7ff6db594a70 104 API calls 22997->23004 22999 7ff6db594a70 104 API calls 22998->22999 22998->23007 23005 7ff6db59a0c9 22999->23005 23000 7ff6db59424c 100 API calls 23002 7ff6db59a7f5 23000->23002 23001 7ff6db594c40 101 API calls 23001->23004 23003 7ff6db591b70 31 API calls 23002->23003 23003->22988 23004->22994 23004->22996 23004->22997 23004->23001 23004->23007 23005->23007 23010 7ff6db59a0d7 __vcrt_FlsAlloc 23005->23010 23045 7ff6db5a02f8 MultiByteToWideChar 23005->23045 23007->23000 23008 7ff6db59a5ec 23017 7ff6db59a6c2 23008->23017 23051 7ff6db5c0458 31 API calls 2 library calls 23008->23051 23010->23007 23010->23008 23011 7ff6db59a557 23010->23011 23012 7ff6db59a54b 23010->23012 23027 7ff6db5a0644 WideCharToMultiByte 23010->23027 23029 7ff6db59a829 23010->23029 23046 7ff6db59ae88 45 API calls _snwprintf 23010->23046 23047 7ff6db5bd5ec 31 API calls 2 library calls 23010->23047 23011->23008 23048 7ff6db5c0458 31 API calls 2 library calls 23011->23048 23012->22794 23015 7ff6db59a6ae 23015->23017 23053 7ff6db5990cc 33 API calls Concurrency::cancel_current_task 23015->23053 23016 7ff6db59a7a2 23018 7ff6db5bd7c0 31 API calls 23016->23018 23017->23016 23019 7ff6db599254 33 API calls 23017->23019 23021 7ff6db59a7cb 23018->23021 23019->23017 23024 7ff6db5bd7c0 31 API calls 23021->23024 23022 7ff6db59a649 23052 7ff6db5bec84 31 API calls _invalid_parameter_noinfo_noreturn 23022->23052 23023 7ff6db59a56d 23049 7ff6db5bec84 31 API calls _invalid_parameter_noinfo_noreturn 23023->23049 23024->23007 23026 7ff6db59a5d8 23026->23008 23050 7ff6db5990cc 33 API calls Concurrency::cancel_current_task 23026->23050 23027->23010 23054 7ff6db5b5db4 8 API calls 23029->23054 23032->22976 23035 7ff6db59a868 23034->23035 23035->22796 23037 7ff6db5bd7ed 23036->23037 23043 7ff6db5bd802 23037->23043 23055 7ff6db5c0b6c 15 API calls _invalid_parameter_noinfo_noreturn 23037->23055 23039 7ff6db5bd7f7 23056 7ff6db5bae34 31 API calls _invalid_parameter_noinfo_noreturn 23039->23056 23040 7ff6db5b5bf0 _handle_error 8 API calls 23042 7ff6db599f37 23040->23042 23042->22990 23043->23040 23044->22973 23045->23010 23046->23010 23047->23010 23048->23023 23049->23026 23050->23008 23051->23022 23052->23015 23053->23017 23054->23032 23055->23039 23056->23043 23057->22817 23058->22819 23060 7ff6db5b4d10 23061 7ff6db5b4c43 23060->23061 23062 7ff6db5b5350 _com_raise_error 14 API calls 23061->23062 23063 7ff6db5b4c82 23062->23063 23068 7ff6db5a9c09 8 API calls _handle_error 22146 7ff6db5a00dc 22147 7ff6db5b3c58 22146->22147 22148 7ff6db5b3d0f 22147->22148 22149 7ff6db5b3c97 22147->22149 22150 7ff6db59aee0 48 API calls 22148->22150 22151 7ff6db59aee0 48 API calls 22149->22151 22152 7ff6db5b3d23 22150->22152 22153 7ff6db5b3cab 22151->22153 22154 7ff6db59d9c0 48 API calls 22152->22154 22155 7ff6db59d9c0 48 API calls 22153->22155 22161 7ff6db5b3cba memcpy_s 22154->22161 22155->22161 22156 7ff6db591b70 31 API calls 22157 7ff6db5b3db9 22156->22157 22158 7ff6db59210c SetDlgItemTextW 22157->22158 22163 7ff6db5b3dce SetDlgItemTextW 22158->22163 22159 7ff6db5b3e44 22162 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22159->22162 22160 7ff6db5b3e3e 22164 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22160->22164 22161->22156 22161->22159 22161->22160 22165 7ff6db5b3e4a 22162->22165 22166 7ff6db5b3e14 22163->22166 22167 7ff6db5b3de7 22163->22167 22164->22159 22168 7ff6db5b5bf0 _handle_error 8 API calls 22166->22168 22167->22166 22169 7ff6db5b3e39 22167->22169 22170 7ff6db5b3e27 22168->22170 22171 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22169->22171 22171->22160 22380 7ff6db5b4ef2 22383 7ff6db5b5350 22380->22383 22409 7ff6db5b4fa8 22383->22409 22386 7ff6db5b53db 22387 7ff6db5b52b8 DloadReleaseSectionWriteAccess 6 API calls 22386->22387 22388 7ff6db5b53e8 RaiseException 22387->22388 22389 7ff6db5b4f31 22388->22389 22390 7ff6db5b548d LoadLibraryExA 22392 7ff6db5b54a4 GetLastError 22390->22392 22393 7ff6db5b54f9 22390->22393 22391 7ff6db5b55d5 22417 7ff6db5b52b8 22391->22417 22396 7ff6db5b54ce 22392->22396 22397 7ff6db5b54b9 22392->22397 22394 7ff6db5b550d 22393->22394 22398 7ff6db5b5504 FreeLibrary 22393->22398 22394->22391 22395 7ff6db5b556b GetProcAddress 22394->22395 22395->22391 22402 7ff6db5b5580 GetLastError 22395->22402 22401 7ff6db5b52b8 DloadReleaseSectionWriteAccess 6 API calls 22396->22401 22397->22393 22397->22396 22398->22394 22399 7ff6db5b5404 22399->22390 22399->22391 22399->22393 22399->22394 22403 7ff6db5b54db RaiseException 22401->22403 22404 7ff6db5b5595 22402->22404 22403->22389 22404->22391 22405 7ff6db5b52b8 DloadReleaseSectionWriteAccess 6 API calls 22404->22405 22406 7ff6db5b55b7 RaiseException 22405->22406 22407 7ff6db5b4fa8 DloadAcquireSectionWriteAccess 6 API calls 22406->22407 22408 7ff6db5b55d1 22407->22408 22408->22391 22410 7ff6db5b4fbe 22409->22410 22416 7ff6db5b5023 22409->22416 22425 7ff6db5b5054 22410->22425 22413 7ff6db5b501e 22415 7ff6db5b5054 DloadAcquireSectionWriteAccess 3 API calls 22413->22415 22415->22416 22416->22386 22416->22399 22418 7ff6db5b52c8 22417->22418 22419 7ff6db5b5321 22417->22419 22420 7ff6db5b5054 DloadAcquireSectionWriteAccess 3 API calls 22418->22420 22419->22389 22421 7ff6db5b52cd 22420->22421 22422 7ff6db5b531c 22421->22422 22423 7ff6db5b5228 DloadProtectSection 3 API calls 22421->22423 22424 7ff6db5b5054 DloadAcquireSectionWriteAccess 3 API calls 22422->22424 22423->22422 22424->22419 22426 7ff6db5b506f 22425->22426 22427 7ff6db5b4fc3 22425->22427 22426->22427 22428 7ff6db5b5074 GetModuleHandleW 22426->22428 22427->22413 22432 7ff6db5b5228 22427->22432 22429 7ff6db5b508e GetProcAddress 22428->22429 22430 7ff6db5b5089 22428->22430 22429->22430 22431 7ff6db5b50a3 GetProcAddress 22429->22431 22430->22427 22431->22430 22434 7ff6db5b524a DloadProtectSection 22432->22434 22433 7ff6db5b5252 22433->22413 22434->22433 22435 7ff6db5b528a VirtualProtect 22434->22435 22437 7ff6db5b50f4 VirtualQuery GetSystemInfo 22434->22437 22435->22433 22437->22435 22438 7ff6db5c9af0 22439 7ff6db5c9b0e 22438->22439 22454 7ff6db5b7808 22439->22454 22441 7ff6db5c9b17 22459 7ff6db5a0d3c 31 API calls 22441->22459 22443 7ff6db5c9b3c 22444 7ff6db5b7808 Concurrency::cancel_current_task 2 API calls 22443->22444 22445 7ff6db5c9b5c 22444->22445 22460 7ff6db5a0d70 31 API calls 22445->22460 22447 7ff6db5c9b7b 22461 7ff6db5a22a4 22447->22461 22455 7ff6db5b7844 RtlPcToFileHeader 22454->22455 22456 7ff6db5b7827 22454->22456 22457 7ff6db5b785c 22455->22457 22458 7ff6db5b786b RaiseException 22455->22458 22456->22455 22457->22458 22458->22441 22459->22443 22460->22447 22462 7ff6db5a22bb 22461->22462 22463 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22462->22463 22464 7ff6db5a22e4 22463->22464 22465 7ff6db5912bc 33 API calls 22464->22465 22466 7ff6db5a23bb 22465->22466 22467 7ff6db5a00d0 83 API calls 22466->22467 22468 7ff6db5a23cf 22467->22468 22469 7ff6db591b70 31 API calls 22468->22469 22470 7ff6db5a23d9 22469->22470 22471 7ff6db5b5aa0 4 API calls 22470->22471 22472 7ff6db5a243d 22471->22472 22477 7ff6db5a1288 31 API calls 22472->22477 22474 7ff6db5a3d56 22478 7ff6db5a1a2c 31 API calls _invalid_parameter_noinfo_noreturn 22474->22478 22476 7ff6db5a3d6e 22477->22474 22478->22476 22481 7ff6db5b4eed 22482 7ff6db5b4e25 22481->22482 22483 7ff6db5b5350 _com_raise_error 14 API calls 22482->22483 22483->22482 22498 7ff6db5b59c0 22499 7ff6db5b59d6 _com_error::_com_error 22498->22499 22500 7ff6db5b7808 Concurrency::cancel_current_task 2 API calls 22499->22500 22501 7ff6db5b59e7 22500->22501 22502 7ff6db5b5350 _com_raise_error 14 API calls 22501->22502 22503 7ff6db5b5a33 22502->22503 22537 7ff6db595db8 22538 7ff6db595dfa 22537->22538 22539 7ff6db595890 51 API calls 22538->22539 22540 7ff6db595e2d 22539->22540 22541 7ff6db595e44 CreateFileW 22540->22541 22542 7ff6db595ff4 51 API calls 22540->22542 22544 7ff6db595e8f 22541->22544 22552 7ff6db595f29 22541->22552 22542->22541 22545 7ff6db5980b0 49 API calls 22544->22545 22546 7ff6db595eb2 22545->22546 22547 7ff6db595eee 22546->22547 22548 7ff6db595eb8 CreateFileW 22546->22548 22547->22552 22555 7ff6db595fec 22547->22555 22548->22547 22549 7ff6db595f81 SetFileTime FindCloseChangeNotification 22550 7ff6db595fc1 22549->22550 22551 7ff6db595fcc 22549->22551 22553 7ff6db595ff4 51 API calls 22550->22553 22554 7ff6db5b5bf0 _handle_error 8 API calls 22551->22554 22552->22549 22552->22551 22553->22551 22556 7ff6db595fd8 22554->22556 22557 7ff6db5bae54 _invalid_parameter_noinfo_noreturn 31 API calls 22555->22557 22558 7ff6db595ff1 22557->22558 23070 7ff6db5bf3cc 23077 7ff6db5c0430 23070->23077 23082 7ff6db5c0910 35 API calls 2 library calls 23077->23082 23081 7ff6db5c043b 23083 7ff6db5c0530 35 API calls abort 23081->23083 23082->23081

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 0 7ff6db59dc08-7ff6db59dc6c call 7ff6db5913c4 GetSystemDirectoryW 3 7ff6db59dc6e-7ff6db59dc70 0->3 4 7ff6db59dc75-7ff6db59dcf0 call 7ff6db5baecc call 7ff6db5912bc call 7ff6db5baecc call 7ff6db5912bc call 7ff6db5988f8 0->4 5 7ff6db59ddd5-7ff6db59dddc 3->5 31 7ff6db59dcf2-7ff6db59dd04 4->31 32 7ff6db59dd24-7ff6db59dd3d 4->32 8 7ff6db59ddde-7ff6db59ddf1 5->8 9 7ff6db59de0d-7ff6db59de34 call 7ff6db5b5bf0 5->9 12 7ff6db59ddf3-7ff6db59de06 8->12 13 7ff6db59de08 call 7ff6db5b5adc 8->13 12->13 17 7ff6db59de35-7ff6db59de3a call 7ff6db5bae54 12->17 13->9 22 7ff6db59de3b-7ff6db59de40 call 7ff6db5bae54 17->22 28 7ff6db59de41-7ff6db59de46 call 7ff6db5bae54 22->28 43 7ff6db59de47-7ff6db59dea4 call 7ff6db5bae54 call 7ff6db5b5c50 GetModuleHandleW 28->43 36 7ff6db59dd1f call 7ff6db5b5adc 31->36 37 7ff6db59dd06-7ff6db59dd19 31->37 33 7ff6db59dd3f-7ff6db59dd51 32->33 34 7ff6db59dd71-7ff6db59dd90 LoadLibraryW 32->34 39 7ff6db59dd53-7ff6db59dd66 33->39 40 7ff6db59dd6c call 7ff6db5b5adc 33->40 41 7ff6db59dd92-7ff6db59dda4 34->41 42 7ff6db59ddc4-7ff6db59ddd1 34->42 36->32 37->22 37->36 39->28 39->40 40->34 45 7ff6db59ddbf call 7ff6db5b5adc 41->45 46 7ff6db59dda6-7ff6db59ddb9 41->46 42->5 53 7ff6db59dea6-7ff6db59deb9 GetProcAddress 43->53 54 7ff6db59defb-7ff6db59e225 43->54 45->42 46->43 46->45 55 7ff6db59ded3-7ff6db59dee6 GetProcAddress 53->55 56 7ff6db59debb-7ff6db59deca 53->56 57 7ff6db59e383-7ff6db59e3a1 call 7ff6db597c10 call 7ff6db598b28 54->57 58 7ff6db59e22b-7ff6db59e234 call 7ff6db5bebfc 54->58 55->54 60 7ff6db59dee8-7ff6db59def8 55->60 56->55 70 7ff6db59e3a5-7ff6db59e3af call 7ff6db596768 57->70 58->57 66 7ff6db59e23a-7ff6db59e27d call 7ff6db597c10 CreateFileW 58->66 60->54 71 7ff6db59e370-7ff6db59e37e CloseHandle call 7ff6db591b70 66->71 72 7ff6db59e283-7ff6db59e296 SetFilePointer 66->72 78 7ff6db59e3b1-7ff6db59e3bc call 7ff6db59dc08 70->78 79 7ff6db59e3e4-7ff6db59e42c call 7ff6db5baecc call 7ff6db5912bc call 7ff6db598dc4 call 7ff6db591b70 call 7ff6db595890 70->79 71->57 72->71 74 7ff6db59e29c-7ff6db59e2be ReadFile 72->74 74->71 77 7ff6db59e2c4-7ff6db59e2d2 74->77 81 7ff6db59e680-7ff6db59e698 call 7ff6db5b5db4 call 7ff6db5a00bc call 7ff6db5a00c4 77->81 82 7ff6db59e2d8-7ff6db59e32c call 7ff6db5baecc call 7ff6db5912bc 77->82 78->79 91 7ff6db59e3be-7ff6db59e3e2 CompareStringW 78->91 126 7ff6db59e431-7ff6db59e434 79->126 119 7ff6db59e6ab-7ff6db59e6b2 81->119 120 7ff6db59e69a-7ff6db59e6a6 call 7ff6db593b84 81->120 102 7ff6db59e343-7ff6db59e359 call 7ff6db59cf94 82->102 91->79 92 7ff6db59e43d-7ff6db59e446 91->92 92->70 99 7ff6db59e44c 92->99 103 7ff6db59e451-7ff6db59e454 99->103 121 7ff6db59e32e-7ff6db59e33e call 7ff6db59dc08 102->121 122 7ff6db59e35b-7ff6db59e36b call 7ff6db591b70 * 2 102->122 104 7ff6db59e4bf-7ff6db59e4c2 103->104 105 7ff6db59e456-7ff6db59e459 103->105 109 7ff6db59e642-7ff6db59e67f call 7ff6db591b70 * 2 call 7ff6db5b5bf0 104->109 110 7ff6db59e4c8-7ff6db59e4db call 7ff6db598be4 call 7ff6db596768 104->110 111 7ff6db59e45d-7ff6db59e4ad call 7ff6db5baecc call 7ff6db5912bc call 7ff6db598dc4 call 7ff6db591b70 call 7ff6db595890 105->111 143 7ff6db59e4e1-7ff6db59e581 call 7ff6db59dc08 * 2 call 7ff6db59aee0 call 7ff6db59d9c0 call 7ff6db59aee0 call 7ff6db59db54 call 7ff6db5ac3a8 call 7ff6db5919d0 110->143 144 7ff6db59e586-7ff6db59e5d3 call 7ff6db59d9c0 AllocConsole 110->144 169 7ff6db59e4af-7ff6db59e4b8 111->169 170 7ff6db59e4bc 111->170 129 7ff6db59e6c5-7ff6db59e6ce SetThreadExecutionState 119->129 130 7ff6db59e6b4-7ff6db59e6c0 call 7ff6db593b84 119->130 120->119 121->102 122->71 136 7ff6db59e44e 126->136 137 7ff6db59e436 126->137 130->129 136->103 137->92 161 7ff6db59e634-7ff6db59e63b call 7ff6db5919d0 ExitProcess 143->161 155 7ff6db59e630 144->155 156 7ff6db59e5d5-7ff6db59e62a GetCurrentProcessId AttachConsole call 7ff6db59e6e8 call 7ff6db59e6d8 GetStdHandle WriteConsoleW Sleep FreeConsole 144->156 155->161 156->155 169->111 173 7ff6db59e4ba 169->173 170->104 173->104
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$AddressProc$DirectoryHandleLibraryLoadModuleSystem
                                                                                                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                                                  • API String ID: 751436351-2013832382
                                                                                                                  • Opcode ID: a8b46b44f977eedfc8151cb4a1cabae6e80def98042c2568dd173c387c5d9116
                                                                                                                  • Instruction ID: 4f4688e5a82fa4d3f6ba4ab7be82dfde6326cca77449c18663f8f6f122576b0a
                                                                                                                  • Opcode Fuzzy Hash: a8b46b44f977eedfc8151cb4a1cabae6e80def98042c2568dd173c387c5d9116
                                                                                                                  • Instruction Fuzzy Hash: E0621971A09B8A99EB119F64E8402ED33A5FF4C354F501237DA4D967BAEF38E265C340
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Item$_invalid_parameter_noinfo_noreturn$Message$DialogText$ButtonChecked$FileSend$ErrorLast$CloseFindFocusLoadStringView$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleIdleInputLineMappingParamShellSleepTickTranslateUnmapWaitWindow
                                                                                                                  • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                                                  • API String ID: 2128803032-2702805183
                                                                                                                  • Opcode ID: 97224029fe9cab8edd64a5884466f27a9e697d5a1cce4a2a6f67228ff52dba46
                                                                                                                  • Instruction ID: 8c8d692c13aa115664900d99b383a5fca34ae3253bae77a40b6171ce8f76c7e2
                                                                                                                  • Opcode Fuzzy Hash: 97224029fe9cab8edd64a5884466f27a9e697d5a1cce4a2a6f67228ff52dba46
                                                                                                                  • Instruction Fuzzy Hash: 1CD28D61A0878A81EE20AF25E8546BD6361EF8D780F404237DA4DD6ABFDF3DE564C710
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskFile$ButtonCheckedMove$DialogItemOperationPathTemp
                                                                                                                  • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                                                  • API String ID: 2285161090-3916287355
                                                                                                                  • Opcode ID: b18a2aa3e64edd6381d2411dd567e45a3b1564c07d6aef4cee5b21f9b150985b
                                                                                                                  • Instruction ID: 6bd9fafae88e55b4c4c77e62b5c2acaf3f25fcad2927eba1dd211c2aa7fb9065
                                                                                                                  • Opcode Fuzzy Hash: b18a2aa3e64edd6381d2411dd567e45a3b1564c07d6aef4cee5b21f9b150985b
                                                                                                                  • Instruction Fuzzy Hash: B5139062B04B8A99EF109F64D8403EC27A1EB48798F500537DA1D97AFEDF38E5A5C344
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1523 7ff6db5b3fcc-7ff6db5b40a1 call 7ff6db59de50 call 7ff6db597a28 call 7ff6db5ad068 call 7ff6db5b7480 call 7ff6db5ad6e4 1534 7ff6db5b40a3-7ff6db5b40b8 1523->1534 1535 7ff6db5b40d8-7ff6db5b40fb 1523->1535 1538 7ff6db5b40d3 call 7ff6db5b5adc 1534->1538 1539 7ff6db5b40ba-7ff6db5b40cd 1534->1539 1536 7ff6db5b4132-7ff6db5b4155 1535->1536 1537 7ff6db5b40fd-7ff6db5b4112 1535->1537 1543 7ff6db5b4157-7ff6db5b416c 1536->1543 1544 7ff6db5b418c-7ff6db5b41af 1536->1544 1541 7ff6db5b4114-7ff6db5b4127 1537->1541 1542 7ff6db5b412d call 7ff6db5b5adc 1537->1542 1538->1535 1539->1538 1545 7ff6db5b4655-7ff6db5b465a call 7ff6db5bae54 1539->1545 1541->1542 1541->1545 1542->1536 1547 7ff6db5b416e-7ff6db5b4181 1543->1547 1548 7ff6db5b4187 call 7ff6db5b5adc 1543->1548 1549 7ff6db5b41b1-7ff6db5b41c6 1544->1549 1550 7ff6db5b41e6-7ff6db5b41f2 GetCommandLineW 1544->1550 1558 7ff6db5b465b-7ff6db5b4687 call 7ff6db5bae54 1545->1558 1547->1545 1547->1548 1548->1544 1556 7ff6db5b41e1 call 7ff6db5b5adc 1549->1556 1557 7ff6db5b41c8-7ff6db5b41db 1549->1557 1553 7ff6db5b43bf-7ff6db5b43d6 call 7ff6db597c10 1550->1553 1554 7ff6db5b41f8-7ff6db5b422f call 7ff6db5baecc call 7ff6db5912bc call 7ff6db5b05e0 1550->1554 1567 7ff6db5b4401-7ff6db5b455c call 7ff6db591b70 SetEnvironmentVariableW GetLocalTime call 7ff6db5961e8 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff6db5aeb24 call 7ff6db599cac call 7ff6db5aa3f0 * 2 DialogBoxParamW call 7ff6db5aa4e4 * 2 1553->1567 1568 7ff6db5b43d8-7ff6db5b43fd call 7ff6db591b70 call 7ff6db5b6dd0 1553->1568 1589 7ff6db5b4231-7ff6db5b4244 1554->1589 1590 7ff6db5b4264-7ff6db5b426b 1554->1590 1556->1550 1557->1545 1557->1556 1570 7ff6db5b46d2-7ff6db5b46e8 call 7ff6db59bbf4 1558->1570 1571 7ff6db5b4689-7ff6db5b469a 1558->1571 1684 7ff6db5b455e Sleep 1567->1684 1685 7ff6db5b4564-7ff6db5b456b 1567->1685 1568->1567 1592 7ff6db5b4735-7ff6db5b473f 1570->1592 1593 7ff6db5b46ea-7ff6db5b46fd 1570->1593 1575 7ff6db5b46b8-7ff6db5b46cb call 7ff6db5b5adc 1571->1575 1576 7ff6db5b469c-7ff6db5b46af 1571->1576 1575->1570 1581 7ff6db5b4924-7ff6db5b4931 call 7ff6db5bae54 1576->1581 1582 7ff6db5b46b5 1576->1582 1609 7ff6db5b4936-7ff6db5b4970 call 7ff6db5b5350 1581->1609 1582->1575 1599 7ff6db5b425f call 7ff6db5b5adc 1589->1599 1600 7ff6db5b4246-7ff6db5b4259 1589->1600 1601 7ff6db5b4271-7ff6db5b428b OpenFileMappingW 1590->1601 1602 7ff6db5b4353-7ff6db5b437d call 7ff6db5baecc call 7ff6db5912bc call 7ff6db5b37d0 1590->1602 1596 7ff6db5b4741-7ff6db5b4754 1592->1596 1597 7ff6db5b478c-7ff6db5b4796 1592->1597 1603 7ff6db5b46ff-7ff6db5b4712 1593->1603 1604 7ff6db5b471b-7ff6db5b472e call 7ff6db5b5adc 1593->1604 1607 7ff6db5b4772-7ff6db5b4785 call 7ff6db5b5adc 1596->1607 1608 7ff6db5b4756-7ff6db5b4769 1596->1608 1610 7ff6db5b47e3-7ff6db5b47ed 1597->1610 1611 7ff6db5b4798-7ff6db5b47ab 1597->1611 1599->1590 1600->1558 1600->1599 1614 7ff6db5b4291-7ff6db5b42b1 MapViewOfFile 1601->1614 1615 7ff6db5b4348-7ff6db5b4351 CloseHandle 1601->1615 1657 7ff6db5b4382-7ff6db5b438a 1602->1657 1603->1581 1616 7ff6db5b4718 1603->1616 1604->1592 1607->1597 1608->1581 1622 7ff6db5b476f 1608->1622 1631 7ff6db5b4975-7ff6db5b49b6 1609->1631 1618 7ff6db5b47ef-7ff6db5b4802 1610->1618 1619 7ff6db5b483a-7ff6db5b4844 1610->1619 1624 7ff6db5b47c9-7ff6db5b47dc call 7ff6db5b5adc 1611->1624 1625 7ff6db5b47ad-7ff6db5b47c0 1611->1625 1614->1615 1627 7ff6db5b42b7-7ff6db5b42e7 UnmapViewOfFile MapViewOfFile 1614->1627 1615->1553 1616->1604 1629 7ff6db5b4820-7ff6db5b4833 call 7ff6db5b5adc 1618->1629 1630 7ff6db5b4804-7ff6db5b4817 1618->1630 1633 7ff6db5b4891-7ff6db5b491e call 7ff6db591b70 * 10 1619->1633 1634 7ff6db5b4846-7ff6db5b4859 1619->1634 1622->1607 1624->1610 1625->1581 1636 7ff6db5b47c6 1625->1636 1627->1615 1628 7ff6db5b42e9-7ff6db5b4342 call 7ff6db5adcc8 call 7ff6db5b37d0 call 7ff6db59bd2c call 7ff6db59be78 call 7ff6db59bee8 UnmapViewOfFile 1627->1628 1628->1615 1629->1619 1630->1581 1643 7ff6db5b481d 1630->1643 1631->1609 1633->1581 1647 7ff6db5b4877-7ff6db5b488a call 7ff6db5b5adc 1634->1647 1648 7ff6db5b485b-7ff6db5b486e 1634->1648 1636->1624 1643->1629 1647->1633 1648->1581 1654 7ff6db5b4874 1648->1654 1654->1647 1657->1553 1663 7ff6db5b438c-7ff6db5b439f 1657->1663 1667 7ff6db5b43a1-7ff6db5b43b4 1663->1667 1668 7ff6db5b43ba call 7ff6db5b5adc 1663->1668 1667->1668 1672 7ff6db5b464f-7ff6db5b4654 call 7ff6db5bae54 1667->1672 1668->1553 1672->1545 1684->1685 1688 7ff6db5b4572-7ff6db5b4595 call 7ff6db59bc58 DeleteObject 1685->1688 1689 7ff6db5b456d call 7ff6db5ada84 1685->1689 1697 7ff6db5b4597 DeleteObject 1688->1697 1698 7ff6db5b459d-7ff6db5b45a4 1688->1698 1689->1688 1697->1698 1700 7ff6db5b45c0-7ff6db5b45d1 1698->1700 1701 7ff6db5b45a6-7ff6db5b45ad 1698->1701 1704 7ff6db5b45e5-7ff6db5b45f2 1700->1704 1705 7ff6db5b45d3-7ff6db5b45df call 7ff6db5b38e8 CloseHandle 1700->1705 1701->1700 1703 7ff6db5b45af-7ff6db5b45bb call 7ff6db593ef4 1701->1703 1703->1700 1707 7ff6db5b45f4-7ff6db5b4601 1704->1707 1708 7ff6db5b4617-7ff6db5b461c call 7ff6db5ad0e0 1704->1708 1705->1704 1713 7ff6db5b4611-7ff6db5b4613 1707->1713 1714 7ff6db5b4603-7ff6db5b460b 1707->1714 1720 7ff6db5b4621-7ff6db5b464e call 7ff6db5b5bf0 1708->1720 1713->1708 1719 7ff6db5b4615 1713->1719 1714->1708 1718 7ff6db5b460d-7ff6db5b460f 1714->1718 1718->1708 1719->1708
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$EnvironmentHandleVariableView_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                                  • API String ID: 3767324925-3710569615
                                                                                                                  • Opcode ID: a4fd30fc6878d5ba86804301da7d8762840bb296d5c5833629e00c0f0901e51c
                                                                                                                  • Instruction ID: c9ee4f22cbf9c923592c5ccb59ee46c8c5b1f2aadb4b8691bb244c4354224317
                                                                                                                  • Opcode Fuzzy Hash: a4fd30fc6878d5ba86804301da7d8762840bb296d5c5833629e00c0f0901e51c
                                                                                                                  • Instruction Fuzzy Hash: 55428E61A09A8A81EE10DF25E8552BD6365FF8CB84F404237DA5D86ABFDF3CE160C704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$Rect$ItemText$ByteCharClientLongMetricsMultiSystemWideswprintf
                                                                                                                  • String ID: $%s:$CAPTION
                                                                                                                  • API String ID: 1936833115-404845831
                                                                                                                  • Opcode ID: b9588f3bcc9fb78bf435deab31d3e40baea3dd9f5c07f83a61a3ce29a07e8747
                                                                                                                  • Instruction ID: 96b6428805a47751bc7627e5524e1a51bb048a363297dfd3bc4b4a04b0e718d0
                                                                                                                  • Opcode Fuzzy Hash: b9588f3bcc9fb78bf435deab31d3e40baea3dd9f5c07f83a61a3ce29a07e8747
                                                                                                                  • Instruction Fuzzy Hash: 9F91E876B1864587EB18DF29A80066DA7A1F78C784F445136EE4D87B6DDF3DE805CB00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                                                                                                  • String ID: PNG
                                                                                                                  • API String ID: 4097654274-364855578
                                                                                                                  • Opcode ID: 75966c197c38ca84d354d4050cb608c385baf803c2fd171f6e68603f3e230818
                                                                                                                  • Instruction ID: 7406562671b5cca113416fd6a9e6938840e1571a1fd2d14f81615f72030be514
                                                                                                                  • Opcode Fuzzy Hash: 75966c197c38ca84d354d4050cb608c385baf803c2fd171f6e68603f3e230818
                                                                                                                  • Instruction Fuzzy Hash: 83410C21A09A0E86EF149F26A85477D63A1AF8CB95F044437CE0D877BAEF7CE4648710
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2243 7ff6db59647c-7ff6db5964b3 2244 7ff6db596592-7ff6db59659f FindNextFileW 2243->2244 2245 7ff6db5964b9-7ff6db5964c1 2243->2245 2248 7ff6db5965a1-7ff6db5965b1 GetLastError 2244->2248 2249 7ff6db5965b3-7ff6db5965b6 2244->2249 2246 7ff6db5964c3 2245->2246 2247 7ff6db5964c6-7ff6db5964d8 FindFirstFileW 2245->2247 2246->2247 2247->2249 2250 7ff6db5964de-7ff6db596506 call 7ff6db5980b0 2247->2250 2251 7ff6db59658a-7ff6db59658d 2248->2251 2252 7ff6db5965d1-7ff6db596613 call 7ff6db5baecc call 7ff6db5912bc call 7ff6db598dc4 2249->2252 2253 7ff6db5965b8-7ff6db5965c0 2249->2253 2263 7ff6db596527-7ff6db596530 2250->2263 2264 7ff6db596508-7ff6db596524 FindFirstFileW 2250->2264 2254 7ff6db5966ab-7ff6db5966ce call 7ff6db5b5bf0 2251->2254 2279 7ff6db596615-7ff6db59662c 2252->2279 2280 7ff6db59664c-7ff6db5966a6 call 7ff6db59e8c0 * 3 2252->2280 2256 7ff6db5965c2 2253->2256 2257 7ff6db5965c5-7ff6db5965cc call 7ff6db591c80 2253->2257 2256->2257 2257->2252 2267 7ff6db596532-7ff6db596549 2263->2267 2268 7ff6db596569-7ff6db59656d 2263->2268 2264->2263 2270 7ff6db596564 call 7ff6db5b5adc 2267->2270 2271 7ff6db59654b-7ff6db59655e 2267->2271 2268->2249 2272 7ff6db59656f-7ff6db59657e GetLastError 2268->2272 2270->2268 2271->2270 2274 7ff6db5966d5-7ff6db5966db call 7ff6db5bae54 2271->2274 2276 7ff6db596580-7ff6db596586 2272->2276 2277 7ff6db596588 2272->2277 2276->2251 2276->2277 2277->2251 2284 7ff6db59662e-7ff6db596641 2279->2284 2285 7ff6db596647 call 7ff6db5b5adc 2279->2285 2280->2254 2284->2285 2286 7ff6db5966cf-7ff6db5966d4 call 7ff6db5bae54 2284->2286 2285->2280 2286->2274
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 474548282-0
                                                                                                                  • Opcode ID: 3232c531fdeeba92cb8b2636fe653f0c83ec3de006f74088c56ffd2a45e2b825
                                                                                                                  • Instruction ID: 604b6eaa7e9b2075e0e779936073a9320205e32aae44f85a973c3e69d4b5069c
                                                                                                                  • Opcode Fuzzy Hash: 3232c531fdeeba92cb8b2636fe653f0c83ec3de006f74088c56ffd2a45e2b825
                                                                                                                  • Instruction Fuzzy Hash: B361B8B2A18A4A85DF109F14E48026D6361FB8D7A4F505332EA7D836EEDF3CD564C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: c
                                                                                                                  • API String ID: 0-112844655
                                                                                                                  • Opcode ID: ae8dcd467804f4fac81c03485604d65bbaff8507a22c8b4058f42cf378931083
                                                                                                                  • Instruction ID: 8e74368b85c2eb8b72926e69944d1ee3737e25cdeaf2f29c199fab21f641b3c7
                                                                                                                  • Opcode Fuzzy Hash: ae8dcd467804f4fac81c03485604d65bbaff8507a22c8b4058f42cf378931083
                                                                                                                  • Instruction Fuzzy Hash: 0CE1C533A186558BE714CF28E440AAD77A1F788758F504136DA5AA3B99DF3CF851CF10
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 53ebbce124585f874c0c6a2db036f4bfcbac334570bdaf6e3d0bcab1b7f06e7b
                                                                                                                  • Instruction ID: f26bf8b23616a5d565df57b827472f65b66002f1684a5194699aa1ec4311d7cf
                                                                                                                  • Opcode Fuzzy Hash: 53ebbce124585f874c0c6a2db036f4bfcbac334570bdaf6e3d0bcab1b7f06e7b
                                                                                                                  • Instruction Fuzzy Hash: 5522DD62E0C95B82EA108F14A44097DA6A4AF4D754F180137DA5EE76FEDF3DF8218F20
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1725 7ff6db5b5350-7ff6db5b53d9 call 7ff6db5b4fa8 1728 7ff6db5b5404-7ff6db5b5421 1725->1728 1729 7ff6db5b53db-7ff6db5b53ff call 7ff6db5b52b8 RaiseException 1725->1729 1731 7ff6db5b5423-7ff6db5b5434 1728->1731 1732 7ff6db5b5436-7ff6db5b543a 1728->1732 1735 7ff6db5b5608-7ff6db5b5625 1729->1735 1734 7ff6db5b543d-7ff6db5b5449 1731->1734 1732->1734 1736 7ff6db5b546a-7ff6db5b546d 1734->1736 1737 7ff6db5b544b-7ff6db5b545d 1734->1737 1738 7ff6db5b5514-7ff6db5b551b 1736->1738 1739 7ff6db5b5473-7ff6db5b5476 1736->1739 1749 7ff6db5b5463 1737->1749 1750 7ff6db5b55d9-7ff6db5b55e3 1737->1750 1741 7ff6db5b552f-7ff6db5b5532 1738->1741 1742 7ff6db5b551d-7ff6db5b552c 1738->1742 1743 7ff6db5b5478-7ff6db5b548b 1739->1743 1744 7ff6db5b548d-7ff6db5b54a2 LoadLibraryExA 1739->1744 1745 7ff6db5b55d5 1741->1745 1746 7ff6db5b5538-7ff6db5b553c 1741->1746 1742->1741 1743->1744 1748 7ff6db5b54f9-7ff6db5b5502 1743->1748 1747 7ff6db5b54a4-7ff6db5b54b7 GetLastError 1744->1747 1744->1748 1745->1750 1751 7ff6db5b553e-7ff6db5b5542 1746->1751 1752 7ff6db5b556b-7ff6db5b557e GetProcAddress 1746->1752 1753 7ff6db5b54ce-7ff6db5b54f4 call 7ff6db5b52b8 RaiseException 1747->1753 1754 7ff6db5b54b9-7ff6db5b54cc 1747->1754 1757 7ff6db5b5504-7ff6db5b5507 FreeLibrary 1748->1757 1758 7ff6db5b550d 1748->1758 1749->1736 1755 7ff6db5b5600 call 7ff6db5b52b8 1750->1755 1756 7ff6db5b55e5-7ff6db5b55f6 1750->1756 1751->1752 1761 7ff6db5b5544-7ff6db5b554f 1751->1761 1752->1745 1764 7ff6db5b5580-7ff6db5b5593 GetLastError 1752->1764 1753->1735 1754->1748 1754->1753 1767 7ff6db5b5605 1755->1767 1756->1755 1757->1758 1758->1738 1761->1752 1765 7ff6db5b5551-7ff6db5b5558 1761->1765 1769 7ff6db5b5595-7ff6db5b55a8 1764->1769 1770 7ff6db5b55aa-7ff6db5b55d1 call 7ff6db5b52b8 RaiseException call 7ff6db5b4fa8 1764->1770 1765->1752 1771 7ff6db5b555a-7ff6db5b555f 1765->1771 1767->1735 1769->1745 1769->1770 1770->1745 1771->1752 1773 7ff6db5b5561-7ff6db5b5569 1771->1773 1773->1745 1773->1752
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DloadSection$AccessWrite$ExceptionProtectRaiseRelease$AcquireErrorLastLibraryLoad
                                                                                                                  • String ID: H
                                                                                                                  • API String ID: 282135826-2852464175
                                                                                                                  • Opcode ID: ec6b86142364bfb102f87cd7a47ae8197552f24f835765eafdb74ad8b8d4d091
                                                                                                                  • Instruction ID: fbd45fe18ad6aac68b4f8597bb21e2aa3f9a4d63b7097f99f8e7195566d9f879
                                                                                                                  • Opcode Fuzzy Hash: ec6b86142364bfb102f87cd7a47ae8197552f24f835765eafdb74ad8b8d4d091
                                                                                                                  • Instruction Fuzzy Hash: 46917F32A05B5986EB44CF65E8506AC33B6BB1C749F444436DE0E977AAEF3CE465C304
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6DB599254: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6DB599389
                                                                                                                  • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF6DB59A375
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB59A82F
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB59A835
                                                                                                                    • Part of subcall function 00007FF6DB5A02F8: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6DB599CBA), ref: 00007FF6DB5A0325
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                                                  • API String ID: 3629253777-3268106645
                                                                                                                  • Opcode ID: 152390f5348180f289d9a39e9accaa95cef2de5bd0463a308de93c4e3f380a90
                                                                                                                  • Instruction ID: c34670ff25941a645971e50e7e1f8a8a272563178b80b10a0f8a6dff75a140c7
                                                                                                                  • Opcode Fuzzy Hash: 152390f5348180f289d9a39e9accaa95cef2de5bd0463a308de93c4e3f380a90
                                                                                                                  • Instruction Fuzzy Hash: D762CFA2A18A8A85EF20DF25C4442BD2365FB49788F805133DA4D876EFEF3DE565C350
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2088 7ff6db5b2ff0-7ff6db5b3033 2089 7ff6db5b33a4-7ff6db5b33c9 call 7ff6db591b70 call 7ff6db5b5bf0 2088->2089 2090 7ff6db5b3039-7ff6db5b3075 call 7ff6db5b7480 2088->2090 2095 7ff6db5b3077 2090->2095 2096 7ff6db5b307a-7ff6db5b3081 2090->2096 2095->2096 2098 7ff6db5b3092-7ff6db5b3096 2096->2098 2099 7ff6db5b3083-7ff6db5b3087 2096->2099 2103 7ff6db5b3098 2098->2103 2104 7ff6db5b309b-7ff6db5b30a6 2098->2104 2101 7ff6db5b3089 2099->2101 2102 7ff6db5b308c-7ff6db5b3090 2099->2102 2101->2102 2102->2104 2103->2104 2105 7ff6db5b3138 2104->2105 2106 7ff6db5b30ac 2104->2106 2107 7ff6db5b313c-7ff6db5b313f 2105->2107 2108 7ff6db5b30b2-7ff6db5b30b9 2106->2108 2109 7ff6db5b3141-7ff6db5b3145 2107->2109 2110 7ff6db5b3147-7ff6db5b314a 2107->2110 2111 7ff6db5b30be-7ff6db5b30c3 2108->2111 2112 7ff6db5b30bb 2108->2112 2109->2110 2113 7ff6db5b3170-7ff6db5b3183 call 7ff6db597b68 2109->2113 2110->2113 2114 7ff6db5b314c-7ff6db5b3153 2110->2114 2115 7ff6db5b30f5-7ff6db5b3100 2111->2115 2116 7ff6db5b30c5 2111->2116 2112->2111 2131 7ff6db5b3185-7ff6db5b31a3 call 7ff6db5a0a5c 2113->2131 2132 7ff6db5b31a8-7ff6db5b31fd call 7ff6db5baecc call 7ff6db5912bc call 7ff6db59587c call 7ff6db591b70 2113->2132 2114->2113 2118 7ff6db5b3155-7ff6db5b316c 2114->2118 2120 7ff6db5b3105-7ff6db5b310a 2115->2120 2121 7ff6db5b3102 2115->2121 2117 7ff6db5b30da-7ff6db5b30e0 2116->2117 2122 7ff6db5b30e2 2117->2122 2123 7ff6db5b30c7-7ff6db5b30ce 2117->2123 2118->2113 2125 7ff6db5b3110-7ff6db5b3117 2120->2125 2126 7ff6db5b33ca-7ff6db5b33d1 2120->2126 2121->2120 2122->2115 2129 7ff6db5b30d0 2123->2129 2130 7ff6db5b30d3-7ff6db5b30d8 2123->2130 2133 7ff6db5b3119 2125->2133 2134 7ff6db5b311c-7ff6db5b3122 2125->2134 2127 7ff6db5b33d3 2126->2127 2128 7ff6db5b33d6-7ff6db5b33db 2126->2128 2127->2128 2135 7ff6db5b33ee-7ff6db5b33f6 2128->2135 2136 7ff6db5b33dd-7ff6db5b33e4 2128->2136 2129->2130 2130->2117 2137 7ff6db5b30e4-7ff6db5b30eb 2130->2137 2131->2132 2155 7ff6db5b31ff-7ff6db5b324d call 7ff6db5baecc call 7ff6db5912bc call 7ff6db5972ac call 7ff6db591b70 2132->2155 2156 7ff6db5b3252-7ff6db5b325f ShellExecuteExW 2132->2156 2133->2134 2134->2126 2140 7ff6db5b3128-7ff6db5b3132 2134->2140 2143 7ff6db5b33f8 2135->2143 2144 7ff6db5b33fb-7ff6db5b3406 2135->2144 2141 7ff6db5b33e9 2136->2141 2142 7ff6db5b33e6 2136->2142 2145 7ff6db5b30f0 2137->2145 2146 7ff6db5b30ed 2137->2146 2140->2105 2140->2108 2141->2135 2142->2141 2143->2144 2144->2107 2145->2115 2146->2145 2155->2156 2158 7ff6db5b3265-7ff6db5b326f 2156->2158 2159 7ff6db5b3356-7ff6db5b335e 2156->2159 2163 7ff6db5b3271-7ff6db5b3274 2158->2163 2164 7ff6db5b327f-7ff6db5b3282 2158->2164 2160 7ff6db5b3360-7ff6db5b3376 2159->2160 2161 7ff6db5b3392-7ff6db5b339f 2159->2161 2168 7ff6db5b3378-7ff6db5b338b 2160->2168 2169 7ff6db5b338d call 7ff6db5b5adc 2160->2169 2161->2089 2163->2164 2165 7ff6db5b3276-7ff6db5b327d 2163->2165 2166 7ff6db5b329e-7ff6db5b32b1 WaitForInputIdle call 7ff6db5b38e8 2164->2166 2167 7ff6db5b3284-7ff6db5b328f IsWindowVisible 2164->2167 2165->2164 2171 7ff6db5b32f3-7ff6db5b3300 CloseHandle 2165->2171 2177 7ff6db5b32b6-7ff6db5b32bd 2166->2177 2167->2166 2172 7ff6db5b3291-7ff6db5b329c ShowWindow 2167->2172 2168->2169 2174 7ff6db5b340b-7ff6db5b3413 call 7ff6db5bae54 2168->2174 2169->2161 2180 7ff6db5b3315-7ff6db5b331c 2171->2180 2181 7ff6db5b3302-7ff6db5b3313 call 7ff6db5a0a5c 2171->2181 2172->2166 2177->2171 2182 7ff6db5b32bf-7ff6db5b32c2 2177->2182 2186 7ff6db5b333e-7ff6db5b3340 2180->2186 2187 7ff6db5b331e-7ff6db5b3321 2180->2187 2181->2180 2181->2186 2182->2171 2190 7ff6db5b32c4-7ff6db5b32d5 GetExitCodeProcess 2182->2190 2186->2159 2189 7ff6db5b3342-7ff6db5b3345 2186->2189 2187->2186 2188 7ff6db5b3323-7ff6db5b3338 2187->2188 2188->2186 2189->2159 2193 7ff6db5b3347-7ff6db5b3355 ShowWindow 2189->2193 2190->2171 2194 7ff6db5b32d7-7ff6db5b32ec 2190->2194 2193->2159 2194->2171
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID: .exe$.inf$Install$p
                                                                                                                  • API String ID: 148627002-3607691742
                                                                                                                  • Opcode ID: 4adb46305a23334cacf1a51893bee26bdd62ea60be37e066bdc47931f0246826
                                                                                                                  • Instruction ID: e389fbfe1f0770da64dffac369f147c88a57c790bf1f375148676251c3539066
                                                                                                                  • Opcode Fuzzy Hash: 4adb46305a23334cacf1a51893bee26bdd62ea60be37e066bdc47931f0246826
                                                                                                                  • Instruction Fuzzy Hash: 81C16A62F18A0A94EE009F25D95467D73B1AF8DB80F044136DA4D97ABEEF3DE4658308
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4119318379-0
                                                                                                                  • Opcode ID: 69e24ba9009fcb1a64d7301b465f30633956cb9a0fdcdd683f7332429d64cc7a
                                                                                                                  • Instruction ID: 6f8abbda5b5e425badd1a3c393307223423df22768364e2025e0fb00acb626e6
                                                                                                                  • Opcode Fuzzy Hash: 69e24ba9009fcb1a64d7301b465f30633956cb9a0fdcdd683f7332429d64cc7a
                                                                                                                  • Instruction Fuzzy Hash: ED41C239B1464A86F7109F61E810BAD2770EB8DB98F445132DD0A87FBACF3DD4558B14
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2240 7ff6db5a2148-7ff6db5a215b call 7ff6db5b578c
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Xinvalid_argumentstd::_
                                                                                                                  • String ID: AES-0017$map/set too long$z01$zip$zipx$zx01
                                                                                                                  • API String ID: 909987262-704999473
                                                                                                                  • Opcode ID: 0c8428a702c9549e3d67e0a258d107a9c9e535c08d7329bd2cb6658a07e594c8
                                                                                                                  • Instruction ID: 5cd0c47a2496f303e8f0987659422d870e00bea4caaa464e06d1051c9b973445
                                                                                                                  • Opcode Fuzzy Hash: 0c8428a702c9549e3d67e0a258d107a9c9e535c08d7329bd2cb6658a07e594c8
                                                                                                                  • Instruction Fuzzy Hash: E0B0125CA0800DC0D02CEF81A85507C0310CB6C700E500C32C30DCFCB78F3870624203
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2294 7ff6db5946a0-7ff6db5946db 2295 7ff6db5946e6 2294->2295 2296 7ff6db5946dd-7ff6db5946e4 2294->2296 2297 7ff6db5946e9-7ff6db594758 2295->2297 2296->2295 2296->2297 2298 7ff6db59475a 2297->2298 2299 7ff6db59475d-7ff6db594788 CreateFileW 2297->2299 2298->2299 2300 7ff6db59478e-7ff6db5947be GetLastError call 7ff6db5980b0 2299->2300 2301 7ff6db594868-7ff6db59486d 2299->2301 2307 7ff6db5947c0-7ff6db59480a CreateFileW GetLastError 2300->2307 2308 7ff6db59480c 2300->2308 2302 7ff6db594873-7ff6db594877 2301->2302 2304 7ff6db594885-7ff6db594889 2302->2304 2305 7ff6db594879-7ff6db59487c 2302->2305 2310 7ff6db5948af-7ff6db5948c3 2304->2310 2311 7ff6db59488b-7ff6db59488f 2304->2311 2305->2304 2309 7ff6db59487e 2305->2309 2314 7ff6db594812-7ff6db59481a 2307->2314 2308->2314 2309->2304 2312 7ff6db5948c5-7ff6db5948d0 2310->2312 2313 7ff6db5948ec-7ff6db594915 call 7ff6db5b5bf0 2310->2313 2311->2310 2315 7ff6db594891-7ff6db5948a9 SetFileTime 2311->2315 2316 7ff6db5948d2-7ff6db5948da 2312->2316 2317 7ff6db5948e8 2312->2317 2318 7ff6db594853-7ff6db594866 2314->2318 2319 7ff6db59481c-7ff6db594833 2314->2319 2315->2310 2321 7ff6db5948df-7ff6db5948e3 call 7ff6db591c80 2316->2321 2322 7ff6db5948dc 2316->2322 2317->2313 2318->2302 2323 7ff6db59484e call 7ff6db5b5adc 2319->2323 2324 7ff6db594835-7ff6db594848 2319->2324 2321->2317 2322->2321 2323->2318 2324->2323 2327 7ff6db594916-7ff6db59491b call 7ff6db5bae54 2324->2327
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3536497005-0
                                                                                                                  • Opcode ID: de468ddf2dfe96221933d5c86a64b2fdcc3bb4c39fb5fb2282992ed972f93084
                                                                                                                  • Instruction ID: 51a705ad9b026da41546ebe75b28c293c2672b22a48ec2f2872a5ac4ba056e41
                                                                                                                  • Opcode Fuzzy Hash: de468ddf2dfe96221933d5c86a64b2fdcc3bb4c39fb5fb2282992ed972f93084
                                                                                                                  • Instruction Fuzzy Hash: 2E6108A6A0878585EB208F29E44036E67B1F788BA8F101336CF6D43AE9DF3DC465C704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2092733347-0
                                                                                                                  • Opcode ID: e045fec339b82cfcbd76d1d976abdda53ec1060d8e03499549cf22dc3b3cc608
                                                                                                                  • Instruction ID: 4b4fad8a8eff83689791d14ac7d3d26e6d57c24a4446f4d936a6aff784005d69
                                                                                                                  • Opcode Fuzzy Hash: e045fec339b82cfcbd76d1d976abdda53ec1060d8e03499549cf22dc3b3cc608
                                                                                                                  • Instruction Fuzzy Hash: CC313B62F10655DDFB04CFB5D8902AC3771FB08759B54502AEE0EA3A69EF38D5A5C304
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2341 7ff6db5b37d0-7ff6db5b37fb 2342 7ff6db5b3800-7ff6db5b383a SetEnvironmentVariableW call 7ff6db59cf94 2341->2342 2343 7ff6db5b37fd 2341->2343 2346 7ff6db5b3887-7ff6db5b388f 2342->2346 2347 7ff6db5b383c 2342->2347 2343->2342 2348 7ff6db5b3891-7ff6db5b38a7 2346->2348 2349 7ff6db5b38c3-7ff6db5b38de call 7ff6db5b5bf0 2346->2349 2350 7ff6db5b3840-7ff6db5b3848 2347->2350 2351 7ff6db5b38be call 7ff6db5b5adc 2348->2351 2352 7ff6db5b38a9-7ff6db5b38bc 2348->2352 2354 7ff6db5b384d-7ff6db5b3858 call 7ff6db59d374 2350->2354 2355 7ff6db5b384a 2350->2355 2351->2349 2352->2351 2356 7ff6db5b38df-7ff6db5b38e7 call 7ff6db5bae54 2352->2356 2362 7ff6db5b3867-7ff6db5b386c 2354->2362 2363 7ff6db5b385a-7ff6db5b3865 2354->2363 2355->2354 2365 7ff6db5b3871-7ff6db5b3886 SetEnvironmentVariableW 2362->2365 2366 7ff6db5b386e 2362->2366 2363->2350 2365->2346 2366->2365
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID: sfxcmd$sfxpar
                                                                                                                  • API String ID: 3540648995-3493335439
                                                                                                                  • Opcode ID: 2bc299da20fbec87d704cc9bab44ddf9c5bd5a2a6beedb7dd826ddad9008950f
                                                                                                                  • Instruction ID: 053c11d0c6596ed590128d12ff973811fe5c426b38db4065bef4d53d0d5784d9
                                                                                                                  • Opcode Fuzzy Hash: 2bc299da20fbec87d704cc9bab44ddf9c5bd5a2a6beedb7dd826ddad9008950f
                                                                                                                  • Instruction Fuzzy Hash: B7318361A15A4984EF048F65E4856AC2371EB4CB98F040136EE1D97ABEDF38D061C344
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • LoadBitmapW.USER32 ref: 00007FF6DB5AEB3A
                                                                                                                  • GetObjectW.GDI32 ref: 00007FF6DB5AEB6B
                                                                                                                  • DeleteObject.GDI32 ref: 00007FF6DB5AEBA5
                                                                                                                  • DeleteObject.GDI32 ref: 00007FF6DB5AEBD5
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: FindResourceW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF6DB5B44D7), ref: 00007FF6DB5AC239
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF6DB5B44D7), ref: 00007FF6DB5AC255
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF6DB5B44D7), ref: 00007FF6DB5AC26F
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF6DB5B44D7), ref: 00007FF6DB5AC281
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: GlobalAlloc.KERNELBASE ref: 00007FF6DB5AC2A2
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: GlobalLock.KERNEL32 ref: 00007FF6DB5AC2B7
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: GdipCreateHBITMAPFromBitmap.GDIPLUS ref: 00007FF6DB5AC365
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: GlobalUnlock.KERNEL32 ref: 00007FF6DB5AC388
                                                                                                                    • Part of subcall function 00007FF6DB5AC220: GlobalFree.KERNEL32 ref: 00007FF6DB5AC391
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                                                                  • String ID: ]
                                                                                                                  • API String ID: 1428510222-3352871620
                                                                                                                  • Opcode ID: 167604b5f0df72b06740ca993f35d2c5df04121dc076d528af12ba987f99282d
                                                                                                                  • Instruction ID: 22a85deccd18d84ecddfa8eecd953f5208803f897c4463655f1083d5e7ae9226
                                                                                                                  • Opcode Fuzzy Hash: 167604b5f0df72b06740ca993f35d2c5df04121dc076d528af12ba987f99282d
                                                                                                                  • Instruction Fuzzy Hash: B5116621F0974E45EA149F51AA5467DA291AF8CBC0F580036D94E97BEFDF2CF8648E10
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2390 7ff6db595db8-7ff6db595df8 2391 7ff6db595e02 2390->2391 2392 7ff6db595dfa-7ff6db595e00 2390->2392 2393 7ff6db595e05-7ff6db595e08 2391->2393 2392->2391 2392->2393 2394 7ff6db595e12 2393->2394 2395 7ff6db595e0a-7ff6db595e10 2393->2395 2396 7ff6db595e15-7ff6db595e18 2394->2396 2395->2394 2395->2396 2397 7ff6db595e22 2396->2397 2398 7ff6db595e1a-7ff6db595e20 2396->2398 2399 7ff6db595e25-7ff6db595e33 call 7ff6db595890 2397->2399 2398->2397 2398->2399 2402 7ff6db595e35-7ff6db595e38 2399->2402 2403 7ff6db595e48-7ff6db595e4a 2399->2403 2402->2403 2404 7ff6db595e3a-7ff6db595e46 call 7ff6db595ff4 2402->2404 2405 7ff6db595e4d-7ff6db595e55 2403->2405 2404->2405 2407 7ff6db595e57 2405->2407 2408 7ff6db595e5a-7ff6db595e89 CreateFileW 2405->2408 2407->2408 2410 7ff6db595e8f-7ff6db595eb6 call 7ff6db5980b0 2408->2410 2411 7ff6db595f4c-7ff6db595f4f 2408->2411 2419 7ff6db595eee-7ff6db595ef6 2410->2419 2420 7ff6db595eb8-7ff6db595eea CreateFileW 2410->2420 2412 7ff6db595f5e-7ff6db595f61 2411->2412 2413 7ff6db595f51-7ff6db595f59 call 7ff6db59e6f0 2411->2413 2416 7ff6db595f6f-7ff6db595f72 2412->2416 2417 7ff6db595f63-7ff6db595f6a call 7ff6db59e6f0 2412->2417 2413->2412 2422 7ff6db595f81-7ff6db595fbf SetFileTime FindCloseChangeNotification 2416->2422 2423 7ff6db595f74-7ff6db595f7c call 7ff6db59e6f0 2416->2423 2417->2416 2426 7ff6db595f2e-7ff6db595f46 2419->2426 2427 7ff6db595ef8-7ff6db595f0e 2419->2427 2420->2419 2424 7ff6db595fc1-7ff6db595fc7 call 7ff6db595ff4 2422->2424 2425 7ff6db595fcc-7ff6db595feb call 7ff6db5b5bf0 2422->2425 2423->2422 2424->2425 2426->2411 2426->2425 2430 7ff6db595f10-7ff6db595f23 2427->2430 2431 7ff6db595f29 call 7ff6db5b5adc 2427->2431 2430->2431 2433 7ff6db595fec-7ff6db595ff3 call 7ff6db5bae54 2430->2433 2431->2426
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Create$ChangeCloseFindNotificationTime_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3481963017-0
                                                                                                                  • Opcode ID: f3536b4aee40a73c934677ccf5fb7d0089b819fd684e28dd030c87cf15701157
                                                                                                                  • Instruction ID: adef263d897b371217b7726c020dffcc1c5298a917318a78fa3f240a683d5aac
                                                                                                                  • Opcode Fuzzy Hash: f3536b4aee40a73c934677ccf5fb7d0089b819fd684e28dd030c87cf15701157
                                                                                                                  • Instruction Fuzzy Hash: 8351A2A2B18B4A89FF508F65F4403BD2361BB4C7A8F404636DE1E966AEDF3891758300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Message$DialogDispatchPeekTranslate
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1266772231-0
                                                                                                                  • Opcode ID: 7cff314f2ed7f30e3d95f64182e7aea28787e66a788d380f9b90687b6d32506f
                                                                                                                  • Instruction ID: c1872c9211bdb2533a4e4ae59f6d2f7e73539d35e0edb908e7ebf89c1e3464d6
                                                                                                                  • Opcode Fuzzy Hash: 7cff314f2ed7f30e3d95f64182e7aea28787e66a788d380f9b90687b6d32506f
                                                                                                                  • Instruction Fuzzy Hash: D7F0EC2AE3964682EB909F60E895E7E6361BFDC705F805032E64E81979DF2CD128CB00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5A564B
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5A5651
                                                                                                                    • Part of subcall function 00007FF6DB596288: FindClose.KERNELBASE(?,?,?,00007FF6DB59FF61), ref: 00007FF6DB5962BD
                                                                                                                    • Part of subcall function 00007FF6DB5A1D8C: swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF6DB5A1DE1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFindswprintf
                                                                                                                  • String ID: zip$zipx
                                                                                                                  • API String ID: 2713956076-1268445101
                                                                                                                  • Opcode ID: 111e2ae9a6dec05b913193d6a7d99dd6340feb832eb43983a38cb543f4e3c297
                                                                                                                  • Instruction ID: d34a88df6e6285838984dfbb293038c79979705da7a3785909054e70e276010d
                                                                                                                  • Opcode Fuzzy Hash: 111e2ae9a6dec05b913193d6a7d99dd6340feb832eb43983a38cb543f4e3c297
                                                                                                                  • Instruction Fuzzy Hash: 6A81AE61F18A4A85FA109F65E4409BC7362AB8CB94F500237DE1DA36BEDF3CE466C714
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                                  • String ID: EDIT
                                                                                                                  • API String ID: 4243998846-3080729518
                                                                                                                  • Opcode ID: 57866ba5747fa0bc54567b454ab76e14fed8a2762cd959d95fef1a34dd28749e
                                                                                                                  • Instruction ID: be7acbfc62b545152ac244f1c73a24fda595a11efcb76454ac0ca8764fc36949
                                                                                                                  • Opcode Fuzzy Hash: 57866ba5747fa0bc54567b454ab76e14fed8a2762cd959d95fef1a34dd28749e
                                                                                                                  • Instruction Fuzzy Hash: DA014B11B19B8A81FB209F11EC20BAA6390AF9C740F481032C94E87A7ADF2CE064CB10
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FoldString_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2025052027-0
                                                                                                                  • Opcode ID: ad31ce6138c6d509ee863a9ae80a56a5b0412e78162fec45d85f12482d5c3e75
                                                                                                                  • Instruction ID: 1e543b391e0e79d5f4428770d72a506e05e5de4373cf92668abd1422aaaada1f
                                                                                                                  • Opcode Fuzzy Hash: ad31ce6138c6d509ee863a9ae80a56a5b0412e78162fec45d85f12482d5c3e75
                                                                                                                  • Instruction Fuzzy Hash: 5AB1B1A2B2864F81EE549F1AD44867D6361FB48B94F548133DA1D877BADFBCE4A0C300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileWrite$Handle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4209713984-0
                                                                                                                  • Opcode ID: 4584e1834c4549640f86172322d02a39c3a02421cc9585911513e252b79e0b25
                                                                                                                  • Instruction ID: 6691a08071a01489dc43de35376088e118474b8c08ba2a9a67e8e23cce82c42e
                                                                                                                  • Opcode Fuzzy Hash: 4584e1834c4549640f86172322d02a39c3a02421cc9585911513e252b79e0b25
                                                                                                                  • Instruction Fuzzy Hash: B551C662B19A4B92EE608F15D54437E6361FB4CB94F405133EA0E86ABADF7CE964C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3750147219-0
                                                                                                                  • Opcode ID: e9005684ad03eae7bd8e62542ef6e359c41c87fba9a5bd2aab67700684a246c7
                                                                                                                  • Instruction ID: 33ea20a6a58ca29e0ec8fcfe3083e40354f4b1c2c42a8df421eaf76148153ada
                                                                                                                  • Opcode Fuzzy Hash: e9005684ad03eae7bd8e62542ef6e359c41c87fba9a5bd2aab67700684a246c7
                                                                                                                  • Instruction Fuzzy Hash: FC516D62F14A5984FF009FA9D4457AD2322AF4CBA4F500637DA1CA6BEFDF6CE4608344
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2359106489-0
                                                                                                                  • Opcode ID: 14e36d29bb000a415a215c96f6d39ebe5615a12eb946510e881d995269f45008
                                                                                                                  • Instruction ID: c2100b0f0f7f78f52360c7f49ce02b3c3686cd8c7ee4f8483ad5bccf1a8df716
                                                                                                                  • Opcode Fuzzy Hash: 14e36d29bb000a415a215c96f6d39ebe5615a12eb946510e881d995269f45008
                                                                                                                  • Instruction Fuzzy Hash: 04318462A1874A81FE609F25B49927D6351FF8CB90F540232EA5E826AEDF3CD5758600
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1452418845-0
                                                                                                                  • Opcode ID: 4d6aa7c42a5cbf6dc14c95ac2672eed8dd3b5ce1cb67293262dad9321be47a97
                                                                                                                  • Instruction ID: a8c49eb42ed3c85c89c9839680c0122460961a347f915cc111e4951548f6f553
                                                                                                                  • Opcode Fuzzy Hash: 4d6aa7c42a5cbf6dc14c95ac2672eed8dd3b5ce1cb67293262dad9321be47a97
                                                                                                                  • Instruction Fuzzy Hash: A231F821E0924F85FA65AF6594527BDA2919F49344F84443AEA0EC72FFDF2DE8258308
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$FileHandleRead
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2244327787-0
                                                                                                                  • Opcode ID: 81b122369233d7b8f515bb11307ece11792f2ae8c3e4e6e271921b1ee2b41d44
                                                                                                                  • Instruction ID: 10ffdcd302a4cd81d3a4375afb91e0f2fc3b38c81bc482992145649880b9facb
                                                                                                                  • Opcode Fuzzy Hash: 81b122369233d7b8f515bb11307ece11792f2ae8c3e4e6e271921b1ee2b41d44
                                                                                                                  • Instruction Fuzzy Hash: F9219FA1E0C64A81EE709F91A44023D67A1FF4DF95F144632DA5D866AECF2CEC758700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DirectoryInitializeMallocSystem
                                                                                                                  • String ID: riched20.dll
                                                                                                                  • API String ID: 174490985-3360196438
                                                                                                                  • Opcode ID: 70bedd0af3f0f8b12c2f0e8abbed213f33e2a1cca035434b18b8ff55cce2bb34
                                                                                                                  • Instruction ID: 14b3906d0b8aa9c1fabad3971beacffa3190de7b10b14d9c0244bf0a8d92d198
                                                                                                                  • Opcode Fuzzy Hash: 70bedd0af3f0f8b12c2f0e8abbed213f33e2a1cca035434b18b8ff55cce2bb34
                                                                                                                  • Instruction Fuzzy Hash: 10F04475919B4582DB00DF10F8541AEB3A0FB8C354F404136E58E82BA9DF7CD158CB04
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$FileOperation
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2032784890-0
                                                                                                                  • Opcode ID: 8043f8b4ba28b2ee793f7dd77ae7ea59e5ff04323e39817f215362f041eaf74e
                                                                                                                  • Instruction ID: f23165656cc21bb851158498ae74b743cee7907da7fe62ed414d4fafab43a934
                                                                                                                  • Opcode Fuzzy Hash: 8043f8b4ba28b2ee793f7dd77ae7ea59e5ff04323e39817f215362f041eaf74e
                                                                                                                  • Instruction Fuzzy Hash: B7616C62B14B49C8EB00DF65D4A42AC3361EB88788F404636DA1DA3BEEDF39E565C710
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2272807158-0
                                                                                                                  • Opcode ID: 49bf7ce20726a0889fef4cdf1579c121035760373733be60429eb0e546bfa457
                                                                                                                  • Instruction ID: 788a09cc9dd8bb9ee3451ccea842cce201fb3ff344510fc6416638cd519abd35
                                                                                                                  • Opcode Fuzzy Hash: 49bf7ce20726a0889fef4cdf1579c121035760373733be60429eb0e546bfa457
                                                                                                                  • Instruction Fuzzy Hash: 2A41967261478982EF209F15E45426D63A1FB48BB4F105336DFAD47AEADF3CD8A08700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2176759853-0
                                                                                                                  • Opcode ID: e9cbc0758f0ac218f2c7f6d8ce98795fc095262f9a2e84838f5c028a29ba0757
                                                                                                                  • Instruction ID: 83121bd1e781da9ebc0ec719b7064baca4c9ce5cb3ba25aca11cd1910d152850
                                                                                                                  • Opcode Fuzzy Hash: e9cbc0758f0ac218f2c7f6d8ce98795fc095262f9a2e84838f5c028a29ba0757
                                                                                                                  • Instruction Fuzzy Hash: 5E21A272A19B8981EA109F65B44016EA364FB8DBD0F145236EB9D43BAADF3CD1A0C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1203560049-0
                                                                                                                  • Opcode ID: 028a4167d2e2c338756a5db1a567916fab5ba0e441f1551a14ba84670f1114d1
                                                                                                                  • Instruction ID: 7aa8f1a422542e81491460f5a657f802ccb6cea4412eea595488593fddf0d303
                                                                                                                  • Opcode Fuzzy Hash: 028a4167d2e2c338756a5db1a567916fab5ba0e441f1551a14ba84670f1114d1
                                                                                                                  • Instruction Fuzzy Hash: 3B21F872A08B8981FF218F25F49526D6361FF8CB94F545232EA9D826AADF2CD564C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3118131910-0
                                                                                                                  • Opcode ID: 24329dc93e2db74fbf3ff938c648f7867179324972ce2d94c87a74dabcd1ca8b
                                                                                                                  • Instruction ID: cb034a9df181bb0798d007bb8258e8b822c921d0e281f81f52f1928318faf2c5
                                                                                                                  • Opcode Fuzzy Hash: 24329dc93e2db74fbf3ff938c648f7867179324972ce2d94c87a74dabcd1ca8b
                                                                                                                  • Instruction Fuzzy Hash: EA21C872A18B8981FE108F25F45522E7361FB8CBD4F501236EA9E826BEDF2CD561C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1203560049-0
                                                                                                                  • Opcode ID: b758bb6361ebbd81519e6b315bcc9c417bc2b8f266a69be79ea9ec31804be294
                                                                                                                  • Instruction ID: db753ee24a02c5528b0642b7518b061a82a5dea5cfb8d1f2bc905b66c9ab5b0f
                                                                                                                  • Opcode Fuzzy Hash: b758bb6361ebbd81519e6b315bcc9c417bc2b8f266a69be79ea9ec31804be294
                                                                                                                  • Instruction Fuzzy Hash: C8217972A18B8981EE109F19F44522D6365FB8C7A4F501332EA9E836BADF3CD561CB04
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1703294689-0
                                                                                                                  • Opcode ID: dacd4d28ee892111b3df8d3e8b80cb264a15a7566b0b4340e23d5be73f25a806
                                                                                                                  • Instruction ID: 8863402ac23181ce4840cc79b62b10cffb2304697d4289a68be7193c2cca4e6a
                                                                                                                  • Opcode Fuzzy Hash: dacd4d28ee892111b3df8d3e8b80cb264a15a7566b0b4340e23d5be73f25a806
                                                                                                                  • Instruction Fuzzy Hash: E7E09A28E0470E82EA586F25988577D23679F9C742F04543AC85E873AFCF3DE46A8250
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID: vector too long
                                                                                                                  • API String ID: 3668304517-2873823879
                                                                                                                  • Opcode ID: e8cf20351d821d3feb503756b95efc1b282f282652a5209dab837311b5c2de94
                                                                                                                  • Instruction ID: 1c18960e44e0ccc134b2477028699aae746ec2658c1415cf1b458141a1d23263
                                                                                                                  • Opcode Fuzzy Hash: e8cf20351d821d3feb503756b95efc1b282f282652a5209dab837311b5c2de94
                                                                                                                  • Instruction Fuzzy Hash: 5E61D67291478586E7009F61D8406AD77B0FB89754F10523AEA9D97BAEDF3CE4A0CB10
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3668304517-0
                                                                                                                  • Opcode ID: 20a31e88887f3ff07632e859f3de259e9b1f14840c8ef42a5d6ffbea492c4ff4
                                                                                                                  • Instruction ID: dace5e2d2ada10ce93c5350c8d438bbaa480880aabf787f13b2b412d887c3e95
                                                                                                                  • Opcode Fuzzy Hash: 20a31e88887f3ff07632e859f3de259e9b1f14840c8ef42a5d6ffbea492c4ff4
                                                                                                                  • Instruction Fuzzy Hash: 1F719F62B14A4A85FE00DF65E4446AC2376AB4CB94F100233DA2D977FEDF38E461C354
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorFileLastPointer
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2976181284-0
                                                                                                                  • Opcode ID: afbb24ce4a808c86d9ab97423e5b5b7dbeb16d4b7f73d0bc2ed342d630b90402
                                                                                                                  • Instruction ID: 270deb0c87920a4002005e86e0867ab1c8f9d88a0d1db0f5874b7e6995a6dcff
                                                                                                                  • Opcode Fuzzy Hash: afbb24ce4a808c86d9ab97423e5b5b7dbeb16d4b7f73d0bc2ed342d630b90402
                                                                                                                  • Instruction Fuzzy Hash: 1C31C362B19A8E82EE704F1AD58067C2351AF49FD5F144132DE1D87BBADF2CDC618700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3587649625-0
                                                                                                                  • Opcode ID: f4ddda21d4384cf1eb27754a95f27d12c8c3738f143f1336b37a874708ab51ff
                                                                                                                  • Instruction ID: 9b468b9b392f2fc656d456353324849be398232fc10de9704c2a7ead017a4c10
                                                                                                                  • Opcode Fuzzy Hash: f4ddda21d4384cf1eb27754a95f27d12c8c3738f143f1336b37a874708ab51ff
                                                                                                                  • Instruction Fuzzy Hash: 6F41A562F14B8A85FB009FA4E4413AC6362EB4CB94F405636DE5C63AEEDF78E060C354
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1746051919-0
                                                                                                                  • Opcode ID: baf3a2c6d4ca6c90161a9cea3eb1c9707450469612d05bb34b4fcf1e06e0f2f4
                                                                                                                  • Instruction ID: 7af4029d611e40f41da8c48bb4f9239c77a6f900b58e2c36a97d345f9841481e
                                                                                                                  • Opcode Fuzzy Hash: baf3a2c6d4ca6c90161a9cea3eb1c9707450469612d05bb34b4fcf1e06e0f2f4
                                                                                                                  • Instruction Fuzzy Hash: 1A31D062A1878D91EE109F15E4453AEB361EB8CB90F444236EB9D47BEADF3CE4608704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$BuffersFlushTime
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1392018926-0
                                                                                                                  • Opcode ID: a27d225e8ae50b9f2b92a99971c080e0e960c57784bde7d607fa2cb0c93f78b5
                                                                                                                  • Instruction ID: a9f8e338c3aba0afadf0554d86274cc7df4b49b231a120c68d6721c33bd54a9b
                                                                                                                  • Opcode Fuzzy Hash: a27d225e8ae50b9f2b92a99971c080e0e960c57784bde7d607fa2cb0c93f78b5
                                                                                                                  • Instruction Fuzzy Hash: A321E5A2E0974A99EE718F11D00137E2790AF09B95F554132DE5C423AAEF3CD9AAC300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: LoadString
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2948472770-0
                                                                                                                  • Opcode ID: dedc9b699e454723cd5290fbfd2bbed97dba7cc30504e392eb1ac5c410963244
                                                                                                                  • Instruction ID: 03fadbdc5b250e51793c0d274c12d9f843622676074ae57c4cfa3ecc06f6dfa1
                                                                                                                  • Opcode Fuzzy Hash: dedc9b699e454723cd5290fbfd2bbed97dba7cc30504e392eb1ac5c410963244
                                                                                                                  • Instruction Fuzzy Hash: D7115BB5B08B498AEA409F1AAC4416CB7A1BB8CFC0B544436DA0DD373ADF3CE5618744
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorFileLastPointer
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2976181284-0
                                                                                                                  • Opcode ID: f476d2bfd4726034d9589a57a35db9820aa07498a5a105237817cbeb34648ff6
                                                                                                                  • Instruction ID: 434cd103508fdecb3a1a425187a575c66f0585553797e8e34075f7cd16d40ba2
                                                                                                                  • Opcode Fuzzy Hash: f476d2bfd4726034d9589a57a35db9820aa07498a5a105237817cbeb34648ff6
                                                                                                                  • Instruction Fuzzy Hash: 26115165A1874682FF608F25E44026D6360EB48FA4F544332EA3D966FADF2CD9A6C701
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Item$RectText$ClientWindowswprintf
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 402765569-0
                                                                                                                  • Opcode ID: 7b1a7923946a01b82bc000e866a5e8131c4a3fcb45aa136cf21fa47d66a637f8
                                                                                                                  • Instruction ID: 0a4a45c370d7aa6eb3ee1b3af87393027eec636f9e8030e197856db7f2ed9bad
                                                                                                                  • Opcode Fuzzy Hash: 7b1a7923946a01b82bc000e866a5e8131c4a3fcb45aa136cf21fa47d66a637f8
                                                                                                                  • Instruction Fuzzy Hash: F0018CA0A0974E81FE595F62A8042BC5391AF8DB40F080036CD0D862BFDF2DE9B59300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1173176844-0
                                                                                                                  • Opcode ID: 62452318fc7dfcde2a8969d92c41a5d48a191f134ba85602d2db1b2b9708db7f
                                                                                                                  • Instruction ID: 93ccadcd4ba5e068562302cfc7f0feb5e7d75f45c29433391aa1574bf2c96081
                                                                                                                  • Opcode Fuzzy Hash: 62452318fc7dfcde2a8969d92c41a5d48a191f134ba85602d2db1b2b9708db7f
                                                                                                                  • Instruction Fuzzy Hash: A8E0EC50E1920F45FD6C3A6224662BC01404F2D775E1C1B33D93E952FBEF2CA4764158
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 588628887-0
                                                                                                                  • Opcode ID: cb26b9ff4c5950cca95b314f348e089e992c2abfe0e8eb9b732e5839e685e898
                                                                                                                  • Instruction ID: 8468bf502b034fff63e1d1d5e080df07a073933dfdea88dddba18b1d05f66186
                                                                                                                  • Opcode Fuzzy Hash: cb26b9ff4c5950cca95b314f348e089e992c2abfe0e8eb9b732e5839e685e898
                                                                                                                  • Instruction Fuzzy Hash: DBE08620E0920F42FF18AFB2580407C23A35F5CB41F08413AC90DC62BBEF2CE4B14240
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3668304517-0
                                                                                                                  • Opcode ID: c831f6c1c583a0f036ba2aeafaa291cffdd4f9c95390a9b99df691c704c2d2a2
                                                                                                                  • Instruction ID: a0fb5a9ae4e8712dbdb526b8ed088edd5c3158e6cb152f097e74a6d45ef2c1d7
                                                                                                                  • Opcode Fuzzy Hash: c831f6c1c583a0f036ba2aeafaa291cffdd4f9c95390a9b99df691c704c2d2a2
                                                                                                                  • Instruction Fuzzy Hash: 96717F62F1865A45FA04CFA5A491ABD2261AF8CB94F504133DE1EE36FFDF2CF4618610
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6DB596288: FindClose.KERNELBASE(?,?,?,00007FF6DB59FF61), ref: 00007FF6DB5962BD
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5A7997
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1011579015-0
                                                                                                                  • Opcode ID: 45f909140742dca8db09808eec7dffea228dcde621a23292cdd16bd8940171e1
                                                                                                                  • Instruction ID: 4476e9817898f1c35e59b6a6a80a7b05dcdc918fb27cb07ebebeaad764754ba9
                                                                                                                  • Opcode Fuzzy Hash: 45f909140742dca8db09808eec7dffea228dcde621a23292cdd16bd8940171e1
                                                                                                                  • Instruction Fuzzy Hash: 2D818E21E1868F45FA629F50A880A7D63A5AF8D384F140137C95DD32BBDF7CF4A08B51
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3668304517-0
                                                                                                                  • Opcode ID: d596fcacf2932472280e52850bc23fd1406ffd3928ce91136bfb68439c9a2780
                                                                                                                  • Instruction ID: 8431a841d2ce51a5d8cf20619862eb051cc797d776f19db722d0a87b9f379804
                                                                                                                  • Opcode Fuzzy Hash: d596fcacf2932472280e52850bc23fd1406ffd3928ce91136bfb68439c9a2780
                                                                                                                  • Instruction Fuzzy Hash: D5617121A1CA9E81FA609F14E4946FD6395AF8D344F404137DA8D92AFFDF6CF4A08A10
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3668304517-0
                                                                                                                  • Opcode ID: be80a681f3ebe096a3e39efc5e6a73eaa9205ef023d27712af51e384f291e438
                                                                                                                  • Instruction ID: 6b660a13cf8dec5614568daf0a3d8ff16d882c4a2e52916f54e688782dd08c65
                                                                                                                  • Opcode Fuzzy Hash: be80a681f3ebe096a3e39efc5e6a73eaa9205ef023d27712af51e384f291e438
                                                                                                                  • Instruction Fuzzy Hash: 2A41E1A2A18B4A40EE149F25E15537D23A1EB48BD4F441136EB5E877BFDF3CE4718600
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3947729631-0
                                                                                                                  • Opcode ID: ab316d70244085b37f1a9f180ae9f1a0cc75e686617e67bb2301c98a3afcfc25
                                                                                                                  • Instruction ID: d44668f03663aa0c7ed944c81b1be7a754bf35e9ac8dda22c38a9088ed127c68
                                                                                                                  • Opcode Fuzzy Hash: ab316d70244085b37f1a9f180ae9f1a0cc75e686617e67bb2301c98a3afcfc25
                                                                                                                  • Instruction Fuzzy Hash: 30416D26E1970E82EE549F25A4903BC6352AF4C744F444037DA0DC76BBEF3DE8658744
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6DB596288: FindClose.KERNELBASE(?,?,?,00007FF6DB59FF61), ref: 00007FF6DB5962BD
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5A4FDF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1011579015-0
                                                                                                                  • Opcode ID: 349575c884770efac5b10cc9c6b91ed871ddbd628aaa8ed1f4d861743054d9cf
                                                                                                                  • Instruction ID: 7de0537232c70bcf556cb7054f5b638dd97580c854fdfd93b38bb9cd9ee72d6e
                                                                                                                  • Opcode Fuzzy Hash: 349575c884770efac5b10cc9c6b91ed871ddbd628aaa8ed1f4d861743054d9cf
                                                                                                                  • Instruction Fuzzy Hash: 91318021A1878A81EE109F59B44176DA3A5BF8CB80F401136DA5D97BBBDF3DE4208700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 680105476-0
                                                                                                                  • Opcode ID: 327a1203c7dc285b24a56b8abfe9f4a02a5b8f444c26b0540cd9890259ede17b
                                                                                                                  • Instruction ID: 81f910989d9b7c8fbec2d9c1b53bcec0391172a31c001dc1beb53664b3b82a64
                                                                                                                  • Opcode Fuzzy Hash: 327a1203c7dc285b24a56b8abfe9f4a02a5b8f444c26b0540cd9890259ede17b
                                                                                                                  • Instruction Fuzzy Hash: 61219162A0826995EE149F51A50027D6260FB0CBF0F680B32DA7E87BEADF7CE0614344
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3215553584-0
                                                                                                                  • Opcode ID: 24a2bf5528e72f997332704ed263b4e8412e4d414351949a569fa1a370b6f0d0
                                                                                                                  • Instruction ID: e25f74e9b659ee645c1fb9dfc0fd0c4bf2c715cf59c0d1afcb3905a3497f2e5a
                                                                                                                  • Opcode Fuzzy Hash: 24a2bf5528e72f997332704ed263b4e8412e4d414351949a569fa1a370b6f0d0
                                                                                                                  • Instruction Fuzzy Hash: F2110D3291C68AC6E7209F11944097D63A6FB49784F650136E68D87AABDF6CE8628B40
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: GetDlgItem.USER32 ref: 00007FF6DB5B2BF3
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: ShowWindow.USER32 ref: 00007FF6DB5B2C19
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2C2E
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2C46
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2C67
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2C83
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2CC6
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2CE4
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2CF8
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2D22
                                                                                                                    • Part of subcall function 00007FF6DB5B2BB4: IsDlgButtonChecked.USER32 ref: 00007FF6DB5B2D3A
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5B37C7
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ButtonChecked$ItemShowWindow_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4003826521-0
                                                                                                                  • Opcode ID: 615bcb0cb0a416a8c661660be79791310ab7e500908418452c3911078b5b42d4
                                                                                                                  • Instruction ID: 079b5e1429d0e62fc2b3d1f873c59231aee12a35490614bdc815eb61b3712961
                                                                                                                  • Opcode Fuzzy Hash: 615bcb0cb0a416a8c661660be79791310ab7e500908418452c3911078b5b42d4
                                                                                                                  • Instruction Fuzzy Hash: 4C012BA2A1468D41ED14AF24E05636D6321FF8D790F400333E6AD867EFEF2CD1508608
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocateHeap
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1279760036-0
                                                                                                                  • Opcode ID: fdf7fba56cf0b327322f638254b73d498613de115c2495db529360746aa1fb94
                                                                                                                  • Instruction ID: 8164e724c6d62efd503ca960dae195b707cb5c1c0c50c2239ce6edb5830bee05
                                                                                                                  • Opcode Fuzzy Hash: fdf7fba56cf0b327322f638254b73d498613de115c2495db529360746aa1fb94
                                                                                                                  • Instruction Fuzzy Hash: CDF06D08B0960F81FE58AE6299003BC53925F8CB80F0C0436C90ED63FBEF2DE4A44218
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6DB59647C: FindFirstFileW.KERNELBASE ref: 00007FF6DB5964CB
                                                                                                                    • Part of subcall function 00007FF6DB59647C: FindFirstFileW.KERNELBASE ref: 00007FF6DB59651E
                                                                                                                    • Part of subcall function 00007FF6DB59647C: GetLastError.KERNEL32 ref: 00007FF6DB59656F
                                                                                                                  • FindClose.KERNELBASE(?,?,?,00007FF6DB59FF61), ref: 00007FF6DB5962BD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Find$FileFirst$CloseErrorLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1464966427-0
                                                                                                                  • Opcode ID: 3b96e4bc9674b0bfe861db3a8d48e59cac22d33fe6a98766aeed1da261f7cc18
                                                                                                                  • Instruction ID: a46b1aa395cfef5f778b94073044d271129913dda17bed74be954c60b3af4646
                                                                                                                  • Opcode Fuzzy Hash: 3b96e4bc9674b0bfe861db3a8d48e59cac22d33fe6a98766aeed1da261f7cc18
                                                                                                                  • Instruction Fuzzy Hash: 3DF08CA290828989EF51AF75A14417C27609B1EBB4F180376DA7D472EFCF28D4A8CB05
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF6DB59427E), ref: 00007FF6DB5942F6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2591292051-0
                                                                                                                  • Opcode ID: 9c850ec0e91a3c36dd67a082f4f7d32c48f886c19389c1b26b24c46edd12351b
                                                                                                                  • Instruction ID: a7dbc671f0cd9566f796ec663b58ae06c7d5d50a3c26982221d31deb5f068fd8
                                                                                                                  • Opcode Fuzzy Hash: 9c850ec0e91a3c36dd67a082f4f7d32c48f886c19389c1b26b24c46edd12351b
                                                                                                                  • Instruction Fuzzy Hash: F0F08C62A0864AD6EF348F31E04037D6760EB08F79F498336DA38811EADF28D8A58300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocateHeap
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1279760036-0
                                                                                                                  • Opcode ID: 3ac92b40718cceacc9b69195e34be5c37b2d5e73e97622ec344ecda480175592
                                                                                                                  • Instruction ID: c34fbda510c6acaa2d5f4b18620cdf2825f8351c43c728716287acc113114ddd
                                                                                                                  • Opcode Fuzzy Hash: 3ac92b40718cceacc9b69195e34be5c37b2d5e73e97622ec344ecda480175592
                                                                                                                  • Instruction Fuzzy Hash: 78F0FE14B9924F85FE545EA2684167D53A24F4CBA0F0C473ADD6EC62EBDF2CE4A18214
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ItemMessageSend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3015471070-0
                                                                                                                  • Opcode ID: 0d82525fd53c5026d2e0a34595dcb8d2fac7aee2738dc896d465c8e25a7063b1
                                                                                                                  • Instruction ID: cd93a2f89ebd383328f24f7aa80e82eab4454fde33cad875ce09a086d1abeeac
                                                                                                                  • Opcode Fuzzy Hash: 0d82525fd53c5026d2e0a34595dcb8d2fac7aee2738dc896d465c8e25a7063b1
                                                                                                                  • Instruction Fuzzy Hash: 0CD05B50F1934942EA109B11E41973D53116B9DB84F500132C94DAA7BBCF3DE1355F44
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CurrentDirectory
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1611563598-0
                                                                                                                  • Opcode ID: b7b94b84bc736c81f561ac6a0213732948c79a519d47e0e60c8097fcab4ddeb2
                                                                                                                  • Instruction ID: b5f52adb7ac97c85a20604a45bbc587de762291913a2eb163cba9a3d443e7294
                                                                                                                  • Opcode Fuzzy Hash: b7b94b84bc736c81f561ac6a0213732948c79a519d47e0e60c8097fcab4ddeb2
                                                                                                                  • Instruction Fuzzy Hash: A1C08C20F0160AC2EE085F26D8C911C13A5BB58F04FA08036C10CD1170DF2CC4BA8300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 749574446-0
                                                                                                                  • Opcode ID: 18013ed5b6161e60d067ba1f4f2b62e7c051905d9142b67b1a2e10f00f48d8d5
                                                                                                                  • Instruction ID: c45b1fb75748ed4798b49b10d6853fc0d621409603c14f54e4581bb73974bc98
                                                                                                                  • Opcode Fuzzy Hash: 18013ed5b6161e60d067ba1f4f2b62e7c051905d9142b67b1a2e10f00f48d8d5
                                                                                                                  • Instruction Fuzzy Hash: 53B09210B02549C2DA046B22DCC211C1325BB88B02B984421C50DE1230CF1CC8FB9B00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                                                  • String ID: %ls$%s: %s
                                                                                                                  • API String ID: 2539828978-2259941744
                                                                                                                  • Opcode ID: 4587800ae16c74fab29afb4d4d5e10f5073634cbc48db8801daaf931a8fdb225
                                                                                                                  • Instruction ID: 7836c66ad8fd6d8b8b231eef6b78c9a67da59cd1d323dc6943025d2cc4e1aa13
                                                                                                                  • Opcode Fuzzy Hash: 4587800ae16c74fab29afb4d4d5e10f5073634cbc48db8801daaf931a8fdb225
                                                                                                                  • Instruction Fuzzy Hash: 33B263A2A5868A81EE109F25E4542BE6312EFDD790F505237E79D836FFDF2CE5608700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                  • API String ID: 1759834784-2761157908
                                                                                                                  • Opcode ID: cff474ce7516bcc2fe87ba0ce5da3ff4c8333ea0e395db14fd9a278ce802bca9
                                                                                                                  • Instruction ID: 2124e53634edc87d9e271dc9e40b8be0c45b5ba50c9661633d01205b86891772
                                                                                                                  • Opcode Fuzzy Hash: cff474ce7516bcc2fe87ba0ce5da3ff4c8333ea0e395db14fd9a278ce802bca9
                                                                                                                  • Instruction Fuzzy Hash: F1B2EC72A081868BE7658E65D4407FD37A2FB4C788F505136DA0A97BAEDF38E614CB40
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1693479884-0
                                                                                                                  • Opcode ID: 36de6dc77820aebfbb77a67a7ed1f64b5a4cbd45e5f1b4befab5dcb77a07d74d
                                                                                                                  • Instruction ID: d914f6338d7e736640e22d3e0a9506fff59f9c7eba2a085fba1bf8f94727980f
                                                                                                                  • Opcode Fuzzy Hash: 36de6dc77820aebfbb77a67a7ed1f64b5a4cbd45e5f1b4befab5dcb77a07d74d
                                                                                                                  • Instruction Fuzzy Hash: 56A191A2F14A5A85FF008F7998445BD2361AB4CBA4F505237DE2D97BEEDF3CE4618204
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3140674995-0
                                                                                                                  • Opcode ID: b19f735c2fc22cb40e9aa071b726c9969eab177a3aaad958e6e5f50a2ca54230
                                                                                                                  • Instruction ID: 641786c40138ad4f58bd0949fda57a6f1da86594d2cde3c4e7b08df046c17918
                                                                                                                  • Opcode Fuzzy Hash: b19f735c2fc22cb40e9aa071b726c9969eab177a3aaad958e6e5f50a2ca54230
                                                                                                                  • Instruction Fuzzy Hash: 1F317472609B8986EB609F60E8403ED7365FB48748F44443ADB4D87BAADF3CD558C714
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1239891234-0
                                                                                                                  • Opcode ID: 91f6c71151a94394cd8503301a90eeb37f847c0064739d62fe8d487df189b3c5
                                                                                                                  • Instruction ID: 236e19cba9ab91cd0fce106b767cb720fc790e3d077cd927ff79ed6b3203b8c5
                                                                                                                  • Opcode Fuzzy Hash: 91f6c71151a94394cd8503301a90eeb37f847c0064739d62fe8d487df189b3c5
                                                                                                                  • Instruction Fuzzy Hash: 65314136618B8986DB608F25E8403AE73A4FB88755F500136EA9D83B6ADF3CD565CB00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6DB5C2F14
                                                                                                                    • Part of subcall function 00007FF6DB5BAE84: GetCurrentProcess.KERNEL32(00007FF6DB5C411D), ref: 00007FF6DB5BAEB1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                                                  • String ID: *?$.
                                                                                                                  • API String ID: 2518042432-3972193922
                                                                                                                  • Opcode ID: 017b1d721b4af7d1e66dd950ed9673e6c77ebd2f4ac1b03ea9e7aafa1045309b
                                                                                                                  • Instruction ID: 3ef86094e5c69fbd63af8913f6a662656c987b6d60f2d0c54b4c2a8b292db719
                                                                                                                  • Opcode Fuzzy Hash: 017b1d721b4af7d1e66dd950ed9673e6c77ebd2f4ac1b03ea9e7aafa1045309b
                                                                                                                  • Instruction Fuzzy Hash: 0851D162B14B9E85EB11CFA198014BC67A6FB4CBD8B444136EE1D97B9ADF3DE0528300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memcpy_s
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1502251526-0
                                                                                                                  • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                                                  • Instruction ID: 4e47eae90b2ddb108e7340ff209fa591eb3078facf64855447b1dd00b5d9e88b
                                                                                                                  • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                                                  • Instruction Fuzzy Hash: 0DD1DE32B1828A87DB64CF55F18466EB7A2FB88784F548135CB4A97B59CF3CE855CB00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00007FF6DB59FD0F), ref: 00007FF6DB593C05
                                                                                                                  • FormatMessageW.KERNEL32(?,?,?,?,?,?,00000000,00007FF6DB59FD0F), ref: 00007FF6DB593C39
                                                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,00007FF6DB59FD0F), ref: 00007FF6DB593C63
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorFormatFreeLastLocalMessage
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1365068426-0
                                                                                                                  • Opcode ID: 40584bd50e56abfa42d30d5238e6f3c450c42cf4bf47e2a503ba7e13edba453c
                                                                                                                  • Instruction ID: df49c8f1c9fc35356a919cecc74453deb8f4fa69615e968fd4743f56690c21cc
                                                                                                                  • Opcode Fuzzy Hash: 40584bd50e56abfa42d30d5238e6f3c450c42cf4bf47e2a503ba7e13edba453c
                                                                                                                  • Instruction Fuzzy Hash: D501127160CB4A82EB509F26B48457E6391FB8DBC4F484036EA5D87B5EDF3CD5258704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: .
                                                                                                                  • API String ID: 0-248832578
                                                                                                                  • Opcode ID: 1c2d5e25cd0aed2788351dff9a5bcdf2c23153dbdd5ab52bfdb82f405cbba37a
                                                                                                                  • Instruction ID: 8e0e235e96d4db8dab878bd630d7db133f22edc2e3e03093c394a20d71cc4494
                                                                                                                  • Opcode Fuzzy Hash: 1c2d5e25cd0aed2788351dff9a5bcdf2c23153dbdd5ab52bfdb82f405cbba37a
                                                                                                                  • Instruction Fuzzy Hash: 2531EA22B1469D45EB609F22A8057BD6B92EB49BE4F048336DE6C47BDACF3CD5118300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionRaise_clrfp
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 15204871-0
                                                                                                                  • Opcode ID: 06edcf5cf4dff743b823cf551a0825fa65dd09d8c660a7c3592381f100fbb939
                                                                                                                  • Instruction ID: c1033632e04de86657f7ab172c69ebeb63d61d3bb2cbd242236c586d71f56542
                                                                                                                  • Opcode Fuzzy Hash: 06edcf5cf4dff743b823cf551a0825fa65dd09d8c660a7c3592381f100fbb939
                                                                                                                  • Instruction Fuzzy Hash: 1FB15B73604B898AEB56CF29C84636C37A1F789B48F158922DA9D837BDCF39D461C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ObjectRelease$CapsDevice
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1061551593-0
                                                                                                                  • Opcode ID: ac4a5734d0ec07d16513a391169455eb8c7b86e6224893e86a2b41aab21ed700
                                                                                                                  • Instruction ID: ab4a0859671951692702a5a07fa3a2ff9d4a6ad76cb019a24f2b4b52a11fbdb6
                                                                                                                  • Opcode Fuzzy Hash: ac4a5734d0ec07d16513a391169455eb8c7b86e6224893e86a2b41aab21ed700
                                                                                                                  • Instruction Fuzzy Hash: 02813C36B18A0986EB10DF66E84066D7776FB88B89F004122CE0E97B69DF3DE115C744
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FormatInfoLocaleNumber
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2169056816-0
                                                                                                                  • Opcode ID: c5aacc7d3bf90c30aa8a4618c48231a2257dd42d29752bb85db0feb902625d90
                                                                                                                  • Instruction ID: 244efd844e2cb0c61f49aa249baba317f73763dfc26b5a0b34450a30db0e9fb8
                                                                                                                  • Opcode Fuzzy Hash: c5aacc7d3bf90c30aa8a4618c48231a2257dd42d29752bb85db0feb902625d90
                                                                                                                  • Instruction Fuzzy Hash: F9115C62A18B8995EA619F21F4103AD7360FF8CB44F844136DA4D83669DF3CE265CB84
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Version
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1889659487-0
                                                                                                                  • Opcode ID: 4077126cdc8ab987fc50741f9daa8f64bdc94cd5a3d95bfaac1a76796dfe440a
                                                                                                                  • Instruction ID: 00b908617e7357dfe62342cc3657b6333985ebb344f81309199ebf3bf9bb73b1
                                                                                                                  • Opcode Fuzzy Hash: 4077126cdc8ab987fc50741f9daa8f64bdc94cd5a3d95bfaac1a76796dfe440a
                                                                                                                  • Instruction Fuzzy Hash: 2B01177590864A8AEB648F00E85137D33A1FB9C310F500236E64EC27AEDF7CE4258B00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID: 0
                                                                                                                  • API String ID: 3215553584-4108050209
                                                                                                                  • Opcode ID: 06686b7b4572734f1262003af67c0a24bbb907d8bb70cebd764497e8685b8c46
                                                                                                                  • Instruction ID: 6efafb4862b8dce704f6bb043443079599db6e9e5f54e6bfc8f4d24f5e83644c
                                                                                                                  • Opcode Fuzzy Hash: 06686b7b4572734f1262003af67c0a24bbb907d8bb70cebd764497e8685b8c46
                                                                                                                  • Instruction Fuzzy Hash: 71810622A1820A46FAA88E19844077E23A1EF4DB44F541533DD49E77BFCF2DE866D74C
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID: 0
                                                                                                                  • API String ID: 3215553584-4108050209
                                                                                                                  • Opcode ID: db1fee231e5625b661d99c0bb1e1601d32928d345e8b8bd10099f265d6b394a5
                                                                                                                  • Instruction ID: 733a45eada7ba397724f943a4163082d0841af7f6668765240584df86e035499
                                                                                                                  • Opcode Fuzzy Hash: db1fee231e5625b661d99c0bb1e1601d32928d345e8b8bd10099f265d6b394a5
                                                                                                                  • Instruction Fuzzy Hash: 4C71D121A0C68A46EE688E25804037F6790DF4D744F141537DE09CB6BFCFADE866CB49
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: @
                                                                                                                  • API String ID: 0-2766056989
                                                                                                                  • Opcode ID: fac49c06b1bbe25af6e5a63bb9abcfd360e672b176069c43693a92fa5e221fcf
                                                                                                                  • Instruction ID: d636c612ee3d718e1b05bdc401ce36fba88ee38915481be98921e123ee368a70
                                                                                                                  • Opcode Fuzzy Hash: fac49c06b1bbe25af6e5a63bb9abcfd360e672b176069c43693a92fa5e221fcf
                                                                                                                  • Instruction Fuzzy Hash: 3B41BD62714B498AEA44DF2AE4542AD77A1A75CFD0B49A137DE0DCB7AADF3CD052C300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: HeapProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 54951025-0
                                                                                                                  • Opcode ID: fb17e31c4336a6e786549368164ea907063e7b7d29ca402ec9a733d541c9e3a8
                                                                                                                  • Instruction ID: 6e83c0b0f95a414a38c9b6d7a42e8b5eda7704f298fd42bed18ab9381aea749f
                                                                                                                  • Opcode Fuzzy Hash: fb17e31c4336a6e786549368164ea907063e7b7d29ca402ec9a733d541c9e3a8
                                                                                                                  • Instruction Fuzzy Hash: CEB09220E17A4EC6EE082F116C8221C62A97F4C700F94803AC10C82335DF2C60B68B00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 004e6fe699495e8dee0e1254d2fcb8717b35ad20f34e3b4404bd7249d3c61d79
                                                                                                                  • Instruction ID: 4a721598b7e596390dfc6984cd68849595a2dfc825789a47c552b8c1eddec166
                                                                                                                  • Opcode Fuzzy Hash: 004e6fe699495e8dee0e1254d2fcb8717b35ad20f34e3b4404bd7249d3c61d79
                                                                                                                  • Instruction Fuzzy Hash: AB22F4B3B246508BD728CF15C89AA5E3766F798744B4B8229DF0ACB789DB38D505CB40
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: e33d6343e5b7e9ad6dcbc827fbd29cbbfe42975cbb26bccbf67bb533745a306c
                                                                                                                  • Instruction ID: 0d2cabb1a6c6ac3f10e12cba963ad20b20465ce91511102c67f3eeab0b96dbea
                                                                                                                  • Opcode Fuzzy Hash: e33d6343e5b7e9ad6dcbc827fbd29cbbfe42975cbb26bccbf67bb533745a306c
                                                                                                                  • Instruction Fuzzy Hash: 1ED1ACB2A181D08EE712CB75A0144BE7FB5E31D34DB898252DFD59374AC63EE102DB60
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 84e0e4977cab1338de3375b6970940b4d0a688bf366c8598bb7273e812e3d964
                                                                                                                  • Instruction ID: 630f33e71e6e1e5075a0e81423ba1cf6a768da577d20fe82c898c61941e384db
                                                                                                                  • Opcode Fuzzy Hash: 84e0e4977cab1338de3375b6970940b4d0a688bf366c8598bb7273e812e3d964
                                                                                                                  • Instruction Fuzzy Hash: B261EFA2B181D989EF118F7586104FD7BA2A75D784B458033CF9A9369FCF28E516CB10
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                                                  • Instruction ID: dfc6a9060ed4e88b8c8babf86ac068015a6507b535353f420b16b7a4cca08bca
                                                                                                                  • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                                                  • Instruction Fuzzy Hash: 59F0B7E5E1C00EC2FE682A2E981933D50479B1D310F648837D31AC62EBDE5DA9B51909
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: f94cb7f15edc88b1d12639b83f3e26873c5ba86b2582cc478741a5978fcbbfad
                                                                                                                  • Instruction ID: 49f3021fa1a7751df15737030df27b76992cb49ac45aa00182e2cdf0793261c4
                                                                                                                  • Opcode Fuzzy Hash: f94cb7f15edc88b1d12639b83f3e26873c5ba86b2582cc478741a5978fcbbfad
                                                                                                                  • Instruction Fuzzy Hash: 1AA0012590890AD0EE448F40A8601287731BB58B01B400032D50D810BADF2CA8A0C304
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                  • API String ID: 2565136772-3242537097
                                                                                                                  • Opcode ID: 0b79975b7dd6f8f0ba486823e03a824d6b613ffbf8d8ef1d3073c77c991e81f6
                                                                                                                  • Instruction ID: 988ec3faefe1686392ce010d98ea80ace861c9b663c2738910bf60587be18da7
                                                                                                                  • Opcode Fuzzy Hash: 0b79975b7dd6f8f0ba486823e03a824d6b613ffbf8d8ef1d3073c77c991e81f6
                                                                                                                  • Instruction Fuzzy Hash: A021C520E09A0F81FE559F25A89567DB3A1AF5CB41F481037D90E826BAEF2CE5758304
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                                                                                  • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                                                  • API String ID: 431506467-1315819833
                                                                                                                  • Opcode ID: bcb4179cb134aaecd69bb1018974c144927a361ce7e8632f0acb0859c0cfb88e
                                                                                                                  • Instruction ID: 7e9e6cd2777b0c1a6262542dedb7c0a22fcda8b01f1be4a7d605d3fcb0573363
                                                                                                                  • Opcode Fuzzy Hash: bcb4179cb134aaecd69bb1018974c144927a361ce7e8632f0acb0859c0cfb88e
                                                                                                                  • Instruction Fuzzy Hash: AFB1C262F08B4A85FB009F64D4543AC2362EF8D794F904236DA5CA6AEEDF3CE465C314
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                                                  • API String ID: 3215553584-2617248754
                                                                                                                  • Opcode ID: 9f8170bffb583bfdf174a8d06f7efef4ca07f07771b6dca7e1d75f74b0558bad
                                                                                                                  • Instruction ID: 88973a73a1ab404640812c278b55f4918fd6270c30aa0c0cd18c314912ec95c4
                                                                                                                  • Opcode Fuzzy Hash: 9f8170bffb583bfdf174a8d06f7efef4ca07f07771b6dca7e1d75f74b0558bad
                                                                                                                  • Instruction Fuzzy Hash: 02418D36A05B4999E704CF25E8417ED37A5EB18B98F404136EE5C87BAADF3CD029C344
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$ButtonCheckedObject$ClassDeleteLongName
                                                                                                                  • String ID: STATIC
                                                                                                                  • API String ID: 781704138-1882779555
                                                                                                                  • Opcode ID: bc0be446892835b112d3ea8da969d9d501e29b07b714163f2e7357c3afb8a8db
                                                                                                                  • Instruction ID: 0ee73ea0684864c9e6f9ce1e27f2da84a757109b7063d2d6836760acc0857af9
                                                                                                                  • Opcode Fuzzy Hash: bc0be446892835b112d3ea8da969d9d501e29b07b714163f2e7357c3afb8a8db
                                                                                                                  • Instruction Fuzzy Hash: 0C31A525B1974A86FA109F12A8557BD67A1BB8DBC0F440032DD4D87BAFDF3DE4168710
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                                                  • String ID: UNC$\\?\
                                                                                                                  • API String ID: 4097890229-253988292
                                                                                                                  • Opcode ID: 29b787f37882db0ecd6da3b1f67e66b68305ee06140b4c2be1053d7c54f86f48
                                                                                                                  • Instruction ID: 19c28a48dde1d9f12c2510689d3a7909ce76c66e38e3a5b89613eb20353f7d4b
                                                                                                                  • Opcode Fuzzy Hash: 29b787f37882db0ecd6da3b1f67e66b68305ee06140b4c2be1053d7c54f86f48
                                                                                                                  • Instruction Fuzzy Hash: 5112D0A2B08A4A84EF109F65E4401AD6372EB49BC8F504237DA5D97AFEDF3CD569C340
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$AllocGlobal
                                                                                                                  • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                                                  • API String ID: 2721297748-1533471033
                                                                                                                  • Opcode ID: 45a3543042b97387f6bb2561f99d698dc3f2cfe8d538120b639c686b407d43f5
                                                                                                                  • Instruction ID: 38a5fe7d885f62c5fd059c746ad728dd4241b0710cbeae677c3edda86a77dcb7
                                                                                                                  • Opcode Fuzzy Hash: 45a3543042b97387f6bb2561f99d698dc3f2cfe8d538120b639c686b407d43f5
                                                                                                                  • Instruction Fuzzy Hash: 2781AC62B08A4A95FB00DFA5D4502ED2372AB4C784F400137DE1DA7AAFEF38E526C354
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Item$Text
                                                                                                                  • String ID: LICENSEDLG
                                                                                                                  • API String ID: 1601838975-2177901306
                                                                                                                  • Opcode ID: 1f97a7e4bf7a3fe2923e55ecd3c79c585f864316670f2869f5670703b882f656
                                                                                                                  • Instruction ID: f31b470fff4f141010a82bfedbb79b9aa008ecbd10337b38413a3de89a50b481
                                                                                                                  • Opcode Fuzzy Hash: 1f97a7e4bf7a3fe2923e55ecd3c79c585f864316670f2869f5670703b882f656
                                                                                                                  • Instruction Fuzzy Hash: 38419025E0874A82FB549F12E848B7C67A0AF8CB90F544133C90E87BBACF3CB5658710
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                                                  • API String ID: 2915667086-2207617598
                                                                                                                  • Opcode ID: e8fa8fc3f980664f5c003b0c75dc581ae75b4c6cb51bdfb1281e38584ad31cc9
                                                                                                                  • Instruction ID: da0c0f1b052720d639917ba3dca82c07c013904c1c5714b113c71f24ab0e742e
                                                                                                                  • Opcode Fuzzy Hash: e8fa8fc3f980664f5c003b0c75dc581ae75b4c6cb51bdfb1281e38584ad31cc9
                                                                                                                  • Instruction Fuzzy Hash: 6F3122A0A09A4E81FE048F16A9501BC67A6AF4EB90B445137CA5EC37BEDF7CE4618300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID: $
                                                                                                                  • API String ID: 3668304517-227171996
                                                                                                                  • Opcode ID: 085d9f18d7a4b83615c8a938480494f8be504dd5bff49bb3c9f93f44af82e008
                                                                                                                  • Instruction ID: 6ef3814b52dcd6fbb38c6dded92a80a64ca35318b7578b3bfedac6ea9f099a50
                                                                                                                  • Opcode Fuzzy Hash: 085d9f18d7a4b83615c8a938480494f8be504dd5bff49bb3c9f93f44af82e008
                                                                                                                  • Instruction Fuzzy Hash: 6DF1C162F1464A84EF049F65D8845BC6361AB4CB98F505232CA6DA37EEDF7CF0A0C754
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                                                  • String ID: csm$csm$csm
                                                                                                                  • API String ID: 2940173790-393685449
                                                                                                                  • Opcode ID: e3695ed3a7ab75c2f41384dca50aaf0caa7d86a2d68ccaa239a4f208be398ee0
                                                                                                                  • Instruction ID: cffd1b1f12bf36ff6a6fe4ada8de232a37b4f619cbdbddda121f40b7fbc3f116
                                                                                                                  • Opcode Fuzzy Hash: e3695ed3a7ab75c2f41384dca50aaf0caa7d86a2d68ccaa239a4f208be398ee0
                                                                                                                  • Instruction Fuzzy Hash: 48E1A17290878A8AEB119F24D4803BD77A0FB49748F145137EA8D977ABDF38E5A1C704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6DB5A0A5C: CompareStringW.KERNEL32(?,?,00007FF6DB596C19), ref: 00007FF6DB5A0A7B
                                                                                                                    • Part of subcall function 00007FF6DB5912BC: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6DB5913B6
                                                                                                                    • Part of subcall function 00007FF6DB5A0A8C: CompareStringW.KERNEL32 ref: 00007FF6DB5A0AF2
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5A1D7E
                                                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6DB5A1D84
                                                                                                                  • swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF6DB5A1DE1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CompareString_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskswprintf
                                                                                                                  • String ID: .zipx$.zx$z%s%02d
                                                                                                                  • API String ID: 2859674139-515631857
                                                                                                                  • Opcode ID: 300a0fcbb93f7ac1c6462795a0828149e9574f77c9a8b9f5bddd1855a8c41abb
                                                                                                                  • Instruction ID: 80e9f95355effd284c784a17681633b832401f5738e6681b528c3a9851b5f469
                                                                                                                  • Opcode Fuzzy Hash: 300a0fcbb93f7ac1c6462795a0828149e9574f77c9a8b9f5bddd1855a8c41abb
                                                                                                                  • Instruction Fuzzy Hash: AB71C472A14B4A98EB10DF64E4913EC3361EB8D784F405233EA5D97AAEDF38E164C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF6DB5BAA43,?,?,?,00007FF6DB5B87AE,?,?,?,00007FF6DB5B8769), ref: 00007FF6DB5BA8C1
                                                                                                                  • GetLastError.KERNEL32(?,?,00000000,00007FF6DB5BAA43,?,?,?,00007FF6DB5B87AE,?,?,?,00007FF6DB5B8769), ref: 00007FF6DB5BA8CF
                                                                                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF6DB5BAA43,?,?,?,00007FF6DB5B87AE,?,?,?,00007FF6DB5B8769), ref: 00007FF6DB5BA8F9
                                                                                                                  • FreeLibrary.KERNEL32(?,?,00000000,00007FF6DB5BAA43,?,?,?,00007FF6DB5B87AE,?,?,?,00007FF6DB5B8769), ref: 00007FF6DB5BA93F
                                                                                                                  • GetProcAddress.KERNEL32(?,?,00000000,00007FF6DB5BAA43,?,?,?,00007FF6DB5B87AE,?,?,?,00007FF6DB5B8769), ref: 00007FF6DB5BA94B
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                  • String ID: api-ms-
                                                                                                                  • API String ID: 2559590344-2084034818
                                                                                                                  • Opcode ID: 0a35e4cf0b535ed1e0d384060c68d6c73a0a1e09a5e004e7bb046ac3ecf1ed7d
                                                                                                                  • Instruction ID: 8f47a7c7e1241b0779035125f305203048149afc3ff8d2598d18a60d6bba7bad
                                                                                                                  • Opcode Fuzzy Hash: 0a35e4cf0b535ed1e0d384060c68d6c73a0a1e09a5e004e7bb046ac3ecf1ed7d
                                                                                                                  • Instruction Fuzzy Hash: 8731C461A1AB4981EE129F06A80077D3395BF4CBA4F5A0536DD1DC77AAEF3CE460C704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNEL32(?,?,?,00007FF6DB5B4FC3,?,?,?,00007FF6DB5B537A), ref: 00007FF6DB5B507B
                                                                                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF6DB5B4FC3,?,?,?,00007FF6DB5B537A), ref: 00007FF6DB5B5098
                                                                                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF6DB5B4FC3,?,?,?,00007FF6DB5B537A), ref: 00007FF6DB5B50B4
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressProc$HandleModule
                                                                                                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                                  • API String ID: 667068680-1718035505
                                                                                                                  • Opcode ID: 1444f5c98b94489216eec6f642ec7402f856da51c0bc558bc27b28571981de2b
                                                                                                                  • Instruction ID: 01b81bccac676fa804a1b8ff2ddf1b24ae259ac2280809321f650ef6b2c18985
                                                                                                                  • Opcode Fuzzy Hash: 1444f5c98b94489216eec6f642ec7402f856da51c0bc558bc27b28571981de2b
                                                                                                                  • Instruction Fuzzy Hash: FA11EC20A0DB0E81FD5A4F01B95027C63A15F6C791F585436C81EC67BAEF6DA4748645
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: abort$CallEncodePointerTranslator
                                                                                                                  • String ID: MOC$RCC
                                                                                                                  • API String ID: 2889003569-2084237596
                                                                                                                  • Opcode ID: 99aab100f969a9af31b72ee64e81517848f2055b7f47c3bb8a5147419e517204
                                                                                                                  • Instruction ID: 15f9e1eff7f82bd83f18884c415117bcc34aeb4e3e7345dc450eef9bc83a3842
                                                                                                                  • Opcode Fuzzy Hash: 99aab100f969a9af31b72ee64e81517848f2055b7f47c3bb8a5147419e517204
                                                                                                                  • Instruction Fuzzy Hash: EA91A273A087898AE711CF65E4803AD7BA0FB49788F14413AEE4D577AADF38D1A5C704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                  • String ID: csm$f
                                                                                                                  • API String ID: 2395640692-629598281
                                                                                                                  • Opcode ID: e6df6a21bc1bcd6b356c2ccf2dff27819bc209d3565b64121411194565240f61
                                                                                                                  • Instruction ID: 872a20820c2756e3a535a1761e4638a42031c4a535fc2766f59b1922efa5af6f
                                                                                                                  • Opcode Fuzzy Hash: e6df6a21bc1bcd6b356c2ccf2dff27819bc209d3565b64121411194565240f61
                                                                                                                  • Instruction Fuzzy Hash: 1751C332A0960696EB54DF15E444B2D3795FB48B88F109472DE1E8779EEF38F861C708
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$Show$Rect
                                                                                                                  • String ID: RarHtmlClassName
                                                                                                                  • API String ID: 2396740005-1658105358
                                                                                                                  • Opcode ID: cfbfce3d4d046686411f9e50c38a355a669d4fc1c04817f838859686fdfbd5f3
                                                                                                                  • Instruction ID: c8b6493e4c8d91588ef86061251a5cddf63c8aad0e0628917c5de19561e46805
                                                                                                                  • Opcode Fuzzy Hash: cfbfce3d4d046686411f9e50c38a355a669d4fc1c04817f838859686fdfbd5f3
                                                                                                                  • Instruction Fuzzy Hash: 2B518626A097868AEE64DF25E45077EA760FB8D780F040136DE4E83B6ACF3CF0158B40
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                                  • API String ID: 0-56093855
                                                                                                                  • Opcode ID: 7c8508dbb91623a7f3c2788d42bb5db1e901b31236c0c63f0cf5ebf64345d783
                                                                                                                  • Instruction ID: 7cd4a391d633b105c93d23619f8544789fd751708d072d7f1c1052786c081adc
                                                                                                                  • Opcode Fuzzy Hash: 7c8508dbb91623a7f3c2788d42bb5db1e901b31236c0c63f0cf5ebf64345d783
                                                                                                                  • Instruction Fuzzy Hash: 5D21F624909B4F80EB108F1AF84466CA3A1EB8D788F140437C98DD737ADF7DE0A58745
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                  • Opcode ID: 41ead686425019c1775ba5e3bb7265ff4caf85c1dac70b8825e828e77bbff3ee
                                                                                                                  • Instruction ID: 13e873f23e01459975b1d0c4019201b8cc90ab73631ab3c3ce7f027c0f6dc834
                                                                                                                  • Opcode Fuzzy Hash: 41ead686425019c1775ba5e3bb7265ff4caf85c1dac70b8825e828e77bbff3ee
                                                                                                                  • Instruction Fuzzy Hash: 7DF03C26A29B4E81EE499F11F48437D2362AFCCB91F481036D94F8667ADF2CD4A8C600
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3215553584-0
                                                                                                                  • Opcode ID: 381900d45e4f1c16b758223149b3ea6081eeb26825fd605a318f7aefc7abdc5a
                                                                                                                  • Instruction ID: 9a87c5bf915de87a1f90b198cd8a7138d0a482453c0ca651fe0e0882b5e01bca
                                                                                                                  • Opcode Fuzzy Hash: 381900d45e4f1c16b758223149b3ea6081eeb26825fd605a318f7aefc7abdc5a
                                                                                                                  • Instruction Fuzzy Hash: 58819322A1861B85F7509F6598406BD67A2FB4CB98F044137DE0E93ABBDF3CE462C710
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3659116390-0
                                                                                                                  • Opcode ID: 5cee84214b5d5d1fe9b89f52749d8553c88cf85809fe97fa69090d7091f2c249
                                                                                                                  • Instruction ID: 9d4475570d230613dc7c1a8ef8330c6fa2f29a336dd7c28784a5ea244ed52d50
                                                                                                                  • Opcode Fuzzy Hash: 5cee84214b5d5d1fe9b89f52749d8553c88cf85809fe97fa69090d7091f2c249
                                                                                                                  • Instruction Fuzzy Hash: F651C332A18A5A86E711CF65D4843AC3BB1FB48798F048136CE5E87BAADF38D561C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressProc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 190572456-0
                                                                                                                  • Opcode ID: 61612f5b65f6b94725c0337412fc3945d8fda3945f757fea70703631be7fef25
                                                                                                                  • Instruction ID: b7a72f11964fd421f8c65319a2810fa809a820eca2ed8d2b905013426133117d
                                                                                                                  • Opcode Fuzzy Hash: 61612f5b65f6b94725c0337412fc3945d8fda3945f757fea70703631be7fef25
                                                                                                                  • Instruction Fuzzy Hash: B541B162B0960E81FE159F52A84067D6392BF5CBE0F1D4536DD1DCB6AAEF3DE4A08600
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _set_statfp
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1156100317-0
                                                                                                                  • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                                                  • Instruction ID: ca1ddb9039f752f04f2de2ed89b34458af9dc899e98ed4039b5a47808977e995
                                                                                                                  • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                                                  • Instruction Fuzzy Hash: C6119476E1CA0F01F7581924E4413BE13436F9D3A1F054676E66E8A6FFCF2C74614240
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3621893840-0
                                                                                                                  • Opcode ID: 8b097f18887cb1e3026db83f2a8d48409f38768177490a167cdc872345ad7a60
                                                                                                                  • Instruction ID: 4e8ad3519f5b7c0f1b5fa40ece9ab961806701644094c538e506ccabe7118900
                                                                                                                  • Opcode Fuzzy Hash: 8b097f18887cb1e3026db83f2a8d48409f38768177490a167cdc872345ad7a60
                                                                                                                  • Instruction Fuzzy Hash: 60F04F66F2954A82F7508F60E855F7E6211FFACB05F841032D64E8196ADF2CD469CB04
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: __except_validate_context_recordabort
                                                                                                                  • String ID: csm$csm
                                                                                                                  • API String ID: 746414643-3733052814
                                                                                                                  • Opcode ID: be506e55bd76a4fc1cc33cd602a9f02af468dc5fce4ddee28aa73968aa2bf590
                                                                                                                  • Instruction ID: 66607ada93afb21baf7d817df58c3e7018860ecec9e1cc83881fdcddeba9d6b5
                                                                                                                  • Opcode Fuzzy Hash: be506e55bd76a4fc1cc33cd602a9f02af468dc5fce4ddee28aa73968aa2bf590
                                                                                                                  • Instruction Fuzzy Hash: 3171B6729086958ADB618F25D09077DBBA0EB4AB84F148137EE4C97AAECF3CD461C744
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID: $*
                                                                                                                  • API String ID: 3215553584-3982473090
                                                                                                                  • Opcode ID: 657f2f9f8f19e07b651cb89ce54e29715672433403af4f6c8af21786d19ec375
                                                                                                                  • Instruction ID: b40618723762b780fcb3f36f9128e3744e6bf53b51d3ad989127bb3878ddc29d
                                                                                                                  • Opcode Fuzzy Hash: 657f2f9f8f19e07b651cb89ce54e29715672433403af4f6c8af21786d19ec375
                                                                                                                  • Instruction Fuzzy Hash: 3351367291C64A8AEF658E34805537E37B1EB1DB18F14113BC64AC51FECFA9D8A2C709
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                                                  • String ID: csm
                                                                                                                  • API String ID: 2466640111-1018135373
                                                                                                                  • Opcode ID: 4f70c79daf229c8475289f488428031187c989094b0abae924110d7bf7f31239
                                                                                                                  • Instruction ID: b85ba9b9919c17b179a6162a4d96fab5e9f50dc5382f7648133ca0f71c5af933
                                                                                                                  • Opcode Fuzzy Hash: 4f70c79daf229c8475289f488428031187c989094b0abae924110d7bf7f31239
                                                                                                                  • Instruction Fuzzy Hash: 5F51713661874987E620AF16E14036E77A4FB8DB94F001136DB8D87B6ACF3CD460CB04
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                                                  • String ID: U
                                                                                                                  • API String ID: 2456169464-4171548499
                                                                                                                  • Opcode ID: 143ee672c835b47e9d39a214e2d0b71b073fd5f772bf1f49aeb1557d2e6285a6
                                                                                                                  • Instruction ID: 5aeb4697a556091dd942fba97869dad1928f4c9fa31dafd0bd3731049ccda32f
                                                                                                                  • Opcode Fuzzy Hash: 143ee672c835b47e9d39a214e2d0b71b073fd5f772bf1f49aeb1557d2e6285a6
                                                                                                                  • Instruction Fuzzy Hash: 66419322A19A4A82EB608F25E4443AD7761FB98794F404132EE4EC7BA9DF3CD451CB44
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ObjectRelease
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1429681911-3916222277
                                                                                                                  • Opcode ID: 094a76e232a83a2a33c5fae4996126b44bea50b355e2f007bc03a3c3088fc9cf
                                                                                                                  • Instruction ID: 88c6cd6a8067f0da8871023987e6e2a5abb50f2879dfa2de48672a9c449c8645
                                                                                                                  • Opcode Fuzzy Hash: 094a76e232a83a2a33c5fae4996126b44bea50b355e2f007bc03a3c3088fc9cf
                                                                                                                  • Instruction Fuzzy Hash: FA316E3AA1974586DA148F22B808A2EB7A5F78CFD1F104536ED4B83B29CF3CD0598B04
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CapsDeviceRelease
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 127614599-3916222277
                                                                                                                  • Opcode ID: f39d4aaa32b0f0035c213a3f2668141cc8a749a99fd2638b01b0a4ed9b2b3d7d
                                                                                                                  • Instruction ID: 5793465060d982ff7882a86ff873fe47bdebed351bc47483ac229c81c863475f
                                                                                                                  • Opcode Fuzzy Hash: f39d4aaa32b0f0035c213a3f2668141cc8a749a99fd2638b01b0a4ed9b2b3d7d
                                                                                                                  • Instruction Fuzzy Hash: 10E0C225F0974582EB586BB6F58943EA261AB8CBD0F154036DA0FC3BA9DF3DC4E54304
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1452528299-0
                                                                                                                  • Opcode ID: 28a6e0f161eade46a55d4b14006c5239cca902cb538ec4fbb28876c187c2e248
                                                                                                                  • Instruction ID: 1baf2b435a7ca421314beb576664f97a9c6bcf2b1cd78f5c25ab7f26f8130f11
                                                                                                                  • Opcode Fuzzy Hash: 28a6e0f161eade46a55d4b14006c5239cca902cb538ec4fbb28876c187c2e248
                                                                                                                  • Instruction Fuzzy Hash: D85191A2B14B4A94FF009F65D4552EC2322EB8CB98F404237DA1C977AFEF28E565C344
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1077098981-0
                                                                                                                  • Opcode ID: bfe9647616f5acb524d01bfad6a1faac51e7984751208fbd509d606047b31220
                                                                                                                  • Instruction ID: b6787c530878639598c8fce0af1d5c40fe893f2fd7e4082c1db107655f43cf6c
                                                                                                                  • Opcode Fuzzy Hash: bfe9647616f5acb524d01bfad6a1faac51e7984751208fbd509d606047b31220
                                                                                                                  • Instruction Fuzzy Hash: 54517036A18B4AC6EB509F21E44476E7364FB8C784F501036DA4E97A6DDF3CE524CB50
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4141327611-0
                                                                                                                  • Opcode ID: 121a64c51188f3446642135f8cc11aca021b0cf9c3d40bc74ea66e71a3f826c1
                                                                                                                  • Instruction ID: 3cd198f151aec0eaa2520e5701d711c5f31f618e68f1f79a907364a454ff6517
                                                                                                                  • Opcode Fuzzy Hash: 121a64c51188f3446642135f8cc11aca021b0cf9c3d40bc74ea66e71a3f826c1
                                                                                                                  • Instruction Fuzzy Hash: AD41C531A0C78A46FB669F11D04137D73A2EF48B94F148132DA8D96AEFDF2DD8618700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF6DB5BF8FB), ref: 00007FF6DB5C3FE1
                                                                                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF6DB5BF8FB), ref: 00007FF6DB5C4043
                                                                                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF6DB5BF8FB), ref: 00007FF6DB5C407D
                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF6DB5BF8FB), ref: 00007FF6DB5C40A7
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1557788787-0
                                                                                                                  • Opcode ID: 31d98922058b437aa39038ffcd2f921eb2876f5cb57b8945f77e4444b2cf6093
                                                                                                                  • Instruction ID: 9e4768d8c278cc59ddf29c70745d093100315adab6fc9c5278ca026b8fe169e1
                                                                                                                  • Opcode Fuzzy Hash: 31d98922058b437aa39038ffcd2f921eb2876f5cb57b8945f77e4444b2cf6093
                                                                                                                  • Instruction Fuzzy Hash: A1218421E4879981EA619F11644042DB7A6FF5CFD0F084136DE8EB7BAADF3CE4628300
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(?,?,?,00007FF6DB5BB340,?,?,00000050,00007FF6DB5BD381), ref: 00007FF6DB5C091A
                                                                                                                  • SetLastError.KERNEL32(?,?,?,00007FF6DB5BB340,?,?,00000050,00007FF6DB5BD381), ref: 00007FF6DB5C0982
                                                                                                                  • SetLastError.KERNEL32(?,?,?,00007FF6DB5BB340,?,?,00000050,00007FF6DB5BD381), ref: 00007FF6DB5C0998
                                                                                                                  • abort.LIBCMT ref: 00007FF6DB5C099E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$abort
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1447195878-0
                                                                                                                  • Opcode ID: d23b1ea948c8cc0bb87b14db0d81ebe09fd71346baca008a5f7c6a6520cdbb6e
                                                                                                                  • Instruction ID: 5799b1efcfe1773c3579dd343967bcda79834f646119af78a4e1193a6eb65f05
                                                                                                                  • Opcode Fuzzy Hash: d23b1ea948c8cc0bb87b14db0d81ebe09fd71346baca008a5f7c6a6520cdbb6e
                                                                                                                  • Instruction Fuzzy Hash: 38010920A0960E46FA996F21655523D23A39F4C780F18163ED95E827EFEF6CA8618600
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CapsDevice$Release
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1035833867-0
                                                                                                                  • Opcode ID: 0607dc1d94c92cfa02f60fd2766947dea058399673a1dc8102f04d351872c6bf
                                                                                                                  • Instruction ID: 902920c46cd018a32225124bd56e1e8cda9600d2ecbc507cb15957b00f043ecd
                                                                                                                  • Opcode Fuzzy Hash: 0607dc1d94c92cfa02f60fd2766947dea058399673a1dc8102f04d351872c6bf
                                                                                                                  • Instruction Fuzzy Hash: 35E01264F0A74E83EF195F71A81953D91A1AF4CB55F44403BC80EC67BAEF3DA0A54B04
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                                                  • String ID: e+000$gfff
                                                                                                                  • API String ID: 3215553584-3030954782
                                                                                                                  • Opcode ID: b0595cce0df0af71658d8d5e6ed85b764f27a28e19a233f7f6f9d231745c495e
                                                                                                                  • Instruction ID: ede5c0244bf16e983f97ade5f80a5015b785b6e4795f57d49395d61a36d3ee7d
                                                                                                                  • Opcode Fuzzy Hash: b0595cce0df0af71658d8d5e6ed85b764f27a28e19a233f7f6f9d231745c495e
                                                                                                                  • Instruction Fuzzy Hash: 14511662B187C946E7658F35994136D6B92EB89B90F089232C798C7BEBCF3CD454C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                                                  • String ID: SIZE
                                                                                                                  • API String ID: 449872665-3243624926
                                                                                                                  • Opcode ID: eca7015e9b62392e4a64f3bb422a3b0beb393707cf6c77cc417578d1c3f6afbd
                                                                                                                  • Instruction ID: 74df57c7d9a7d5eb2ef4db9e234d183de3ff9bfb51064b579b0ef51a80052d54
                                                                                                                  • Opcode Fuzzy Hash: eca7015e9b62392e4a64f3bb422a3b0beb393707cf6c77cc417578d1c3f6afbd
                                                                                                                  • Instruction Fuzzy Hash: B441C3A2A1878A86EE109F15E4413AD6350EF8E790F544233EA9D826EFEF3DD550CB00
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                                                  • String ID: C:\Users\user\Desktop\Celery.exe
                                                                                                                  • API String ID: 3307058713-4050010172
                                                                                                                  • Opcode ID: 32830429c5a0a6449ebe3119d6f4074da373c825f732ffc243a16f3f58d0938d
                                                                                                                  • Instruction ID: 97de9fa0cb2034830a6991bacbc494288ca032facda64639239a924989b8cac5
                                                                                                                  • Opcode Fuzzy Hash: 32830429c5a0a6449ebe3119d6f4074da373c825f732ffc243a16f3f58d0938d
                                                                                                                  • Instruction Fuzzy Hash: 59415F36E08B5A89EB55DF25A4401BC67A5AB4CBC4F144037EA4D87B6EDF3DE4628304
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharMultiWide_snwprintf
                                                                                                                  • String ID: $%s$@%s
                                                                                                                  • API String ID: 2650857296-834177443
                                                                                                                  • Opcode ID: 18d1f9567af3e1e829b7edd42c7bfbbb79181edea22946e9fa38abe24f4e2d02
                                                                                                                  • Instruction ID: f4e52f97aa4509a88b4a6b343fd726559c5613af773cee1a603ddacdf17591c7
                                                                                                                  • Opcode Fuzzy Hash: 18d1f9567af3e1e829b7edd42c7bfbbb79181edea22946e9fa38abe24f4e2d02
                                                                                                                  • Instruction Fuzzy Hash: 6D31ADB2B18A4E85EE108F56E4406AD23A4FB49784F441033EE4D97BAEDF3CE525C700
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DialogParamVisibleWindow
                                                                                                                  • String ID: GETPASSWORD1
                                                                                                                  • API String ID: 3157717868-3292211884
                                                                                                                  • Opcode ID: 12189e932543425c6447aedc145ad5b28f270796756dd135d22119d05d049f65
                                                                                                                  • Instruction ID: 3e6fa24bc23235f76f6d67c36b12d9d805b5bb1c0ce90799a44152698c6c930d
                                                                                                                  • Opcode Fuzzy Hash: 12189e932543425c6447aedc145ad5b28f270796756dd135d22119d05d049f65
                                                                                                                  • Instruction Fuzzy Hash: F4317C25A0D7CA80EA00AF12A4585BCAB21FB8DB84F580033DA4D9777FCF2DE560C755
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileHandleType
                                                                                                                  • String ID: @
                                                                                                                  • API String ID: 3000768030-2766056989
                                                                                                                  • Opcode ID: b947de3923641d317ef8b4e62e77dc8d20735a47ca9ba61dc4d579ac66c9413a
                                                                                                                  • Instruction ID: 9969fd4e8f39e1d6e26a6f922c2fecf8d9ba24068db139e5b289412aa82bd13c
                                                                                                                  • Opcode Fuzzy Hash: b947de3923641d317ef8b4e62e77dc8d20735a47ca9ba61dc4d579ac66c9413a
                                                                                                                  • Instruction Fuzzy Hash: 9121A422A0874A81EBA58F25949013D6752EB4D774F281337D66E967FECF3ED8A1C200
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6DB5B57AE), ref: 00007FF6DB5B784C
                                                                                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6DB5B57AE), ref: 00007FF6DB5B7892
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionFileHeaderRaise
                                                                                                                  • String ID: csm
                                                                                                                  • API String ID: 2573137834-1018135373
                                                                                                                  • Opcode ID: 13556f5c8cc8e57bd0135833ed3cb94125f61d8ee28d70f1e7400c7c27568873
                                                                                                                  • Instruction ID: 02dc14f16ec9c2a1f3720f1d44ad13a7523a8682d23087f2d1cfe289cb6ba141
                                                                                                                  • Opcode Fuzzy Hash: 13556f5c8cc8e57bd0135833ed3cb94125f61d8ee28d70f1e7400c7c27568873
                                                                                                                  • Instruction Fuzzy Hash: 79112132A18B8982EB518F15F44026DB7A5FB88B88F184231EF8D47769DF3DD561C704
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1799612576.00007FF6DB591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DB590000, based on PE: true
                                                                                                                  • Associated: 00000000.00000002.1799598392.00007FF6DB590000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799663144.00007FF6DB5CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799682430.00007FF6DB5FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  • Associated: 00000000.00000002.1799769543.00007FF6DB5FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_7ff6db590000_Celery.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FindHandleModuleResource
                                                                                                                  • String ID: RTL
                                                                                                                  • API String ID: 3537982541-834975271
                                                                                                                  • Opcode ID: a45610fe9d42f5f181feef3a06741817b69cf11aeaebfa57cd0cb73b5dfd576c
                                                                                                                  • Instruction ID: 3f9441bc68351624c0261f791881fa278cdf2ef6768e70b35d29e3e1c91c5e4d
                                                                                                                  • Opcode Fuzzy Hash: a45610fe9d42f5f181feef3a06741817b69cf11aeaebfa57cd0cb73b5dfd576c
                                                                                                                  • Instruction Fuzzy Hash: 14D017A5F0960E82FF5A4F62A88837813515B1CB42F48003AC81D863AAEF2ED1B88754
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:18.8%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:13.5%
                                                                                                                  Total number of Nodes:1373
                                                                                                                  Total number of Limit Nodes:22
                                                                                                                  execution_graph 3205 4015c1 3225 402da6 3205->3225 3209 401631 3211 401663 3209->3211 3212 401636 3209->3212 3215 401423 24 API calls 3211->3215 3241 401423 3212->3241 3213 4015d1 3213->3209 3221 4015fa 3213->3221 3223 401617 GetFileAttributesW 3213->3223 3237 405e03 3213->3237 3245 405ad2 3213->3245 3253 405ab5 CreateDirectoryW 3213->3253 3222 40165b 3215->3222 3220 40164a SetCurrentDirectoryW 3220->3222 3221->3213 3248 405a38 CreateDirectoryW 3221->3248 3223->3213 3226 402db2 3225->3226 3256 406544 3226->3256 3229 4015c8 3231 405e81 CharNextW CharNextW 3229->3231 3232 405e9e 3231->3232 3235 405eb0 3231->3235 3234 405eab CharNextW 3232->3234 3232->3235 3233 405ed4 3233->3213 3234->3233 3235->3233 3236 405e03 CharNextW 3235->3236 3236->3235 3238 405e09 3237->3238 3239 405e1f 3238->3239 3240 405e10 CharNextW 3238->3240 3239->3213 3240->3238 3294 405569 3241->3294 3244 406507 lstrcpynW 3244->3220 3305 4068d4 GetModuleHandleA 3245->3305 3249 405a85 3248->3249 3250 405a89 GetLastError 3248->3250 3249->3221 3250->3249 3251 405a98 SetFileSecurityW 3250->3251 3251->3249 3252 405aae GetLastError 3251->3252 3252->3249 3254 405ac5 3253->3254 3255 405ac9 GetLastError 3253->3255 3254->3213 3255->3254 3257 406551 3256->3257 3258 406774 3257->3258 3261 406742 lstrlenW 3257->3261 3262 406659 GetSystemDirectoryW 3257->3262 3266 406544 10 API calls 3257->3266 3267 40666c GetWindowsDirectoryW 3257->3267 3268 4066e3 lstrcatW 3257->3268 3269 406544 10 API calls 3257->3269 3270 40678e 5 API calls 3257->3270 3271 40669b SHGetSpecialFolderLocation 3257->3271 3282 4063d5 3257->3282 3287 40644e wsprintfW 3257->3287 3288 406507 lstrcpynW 3257->3288 3259 402dd3 3258->3259 3289 406507 lstrcpynW 3258->3289 3259->3229 3273 40678e 3259->3273 3261->3257 3262->3257 3266->3261 3267->3257 3268->3257 3269->3257 3270->3257 3271->3257 3272 4066b3 SHGetPathFromIDListW CoTaskMemFree 3271->3272 3272->3257 3274 40679b 3273->3274 3276 406811 3274->3276 3277 406804 CharNextW 3274->3277 3279 405e03 CharNextW 3274->3279 3280 4067f0 CharNextW 3274->3280 3281 4067ff CharNextW 3274->3281 3275 406816 CharPrevW 3275->3276 3276->3275 3278 406837 3276->3278 3277->3274 3277->3276 3278->3229 3279->3274 3280->3274 3281->3277 3290 406374 3282->3290 3285 406439 3285->3257 3286 406409 RegQueryValueExW RegCloseKey 3286->3285 3287->3257 3288->3257 3289->3259 3291 406383 3290->3291 3292 406387 3291->3292 3293 40638c RegOpenKeyExW 3291->3293 3292->3285 3292->3286 3293->3292 3295 405584 3294->3295 3296 401431 3294->3296 3297 4055a0 lstrlenW 3295->3297 3298 406544 17 API calls 3295->3298 3296->3244 3299 4055c9 3297->3299 3300 4055ae lstrlenW 3297->3300 3298->3297 3302 4055dc 3299->3302 3303 4055cf SetWindowTextW 3299->3303 3300->3296 3301 4055c0 lstrcatW 3300->3301 3301->3299 3302->3296 3304 4055e2 SendMessageW SendMessageW SendMessageW 3302->3304 3303->3302 3304->3296 3306 4068f0 3305->3306 3307 4068fa GetProcAddress 3305->3307 3311 406864 GetSystemDirectoryW 3306->3311 3309 405ad9 3307->3309 3309->3213 3310 4068f6 3310->3307 3310->3309 3313 406886 wsprintfW LoadLibraryExW 3311->3313 3313->3310 3975 401c43 3976 402d84 17 API calls 3975->3976 3977 401c4a 3976->3977 3978 402d84 17 API calls 3977->3978 3979 401c57 3978->3979 3980 401c6c 3979->3980 3981 402da6 17 API calls 3979->3981 3982 402da6 17 API calls 3980->3982 3986 401c7c 3980->3986 3981->3980 3982->3986 3983 401cd3 3985 402da6 17 API calls 3983->3985 3984 401c87 3987 402d84 17 API calls 3984->3987 3988 401cd8 3985->3988 3986->3983 3986->3984 3989 401c8c 3987->3989 3991 402da6 17 API calls 3988->3991 3990 402d84 17 API calls 3989->3990 3992 401c98 3990->3992 3993 401ce1 FindWindowExW 3991->3993 3994 401cc3 SendMessageW 3992->3994 3995 401ca5 SendMessageTimeoutW 3992->3995 3996 401d03 3993->3996 3994->3996 3995->3996 3997 4028c4 3998 4028ca 3997->3998 3999 4028d2 FindClose 3998->3999 4000 402c2a 3998->4000 3999->4000 4011 4016cc 4012 402da6 17 API calls 4011->4012 4013 4016d2 GetFullPathNameW 4012->4013 4014 4016ec 4013->4014 4020 40170e 4013->4020 4017 40683d 2 API calls 4014->4017 4014->4020 4015 401723 GetShortPathNameW 4016 402c2a 4015->4016 4018 4016fe 4017->4018 4018->4020 4021 406507 lstrcpynW 4018->4021 4020->4015 4020->4016 4021->4020 4022 401e4e GetDC 4023 402d84 17 API calls 4022->4023 4024 401e60 GetDeviceCaps MulDiv ReleaseDC 4023->4024 4025 402d84 17 API calls 4024->4025 4026 401e91 4025->4026 4027 406544 17 API calls 4026->4027 4028 401ece CreateFontIndirectW 4027->4028 4029 402638 4028->4029 4030 402950 4031 402da6 17 API calls 4030->4031 4032 40295c 4031->4032 4033 402972 4032->4033 4034 402da6 17 API calls 4032->4034 4035 405fd2 2 API calls 4033->4035 4034->4033 4036 402978 4035->4036 4058 405ff7 GetFileAttributesW CreateFileW 4036->4058 4038 402985 4039 402a3b 4038->4039 4040 4029a0 GlobalAlloc 4038->4040 4041 402a23 4038->4041 4042 402a42 DeleteFileW 4039->4042 4043 402a55 4039->4043 4040->4041 4044 4029b9 4040->4044 4045 4032b4 35 API calls 4041->4045 4042->4043 4059 4034af SetFilePointer 4044->4059 4047 402a30 CloseHandle 4045->4047 4047->4039 4048 4029bf 4049 403499 ReadFile 4048->4049 4050 4029c8 GlobalAlloc 4049->4050 4051 4029d8 4050->4051 4052 402a0c 4050->4052 4054 4032b4 35 API calls 4051->4054 4053 4060a9 WriteFile 4052->4053 4055 402a18 GlobalFree 4053->4055 4057 4029e5 4054->4057 4055->4041 4056 402a03 GlobalFree 4056->4052 4057->4056 4058->4038 4059->4048 4060 404ed0 GetDlgItem GetDlgItem 4061 404f22 7 API calls 4060->4061 4069 405147 4060->4069 4062 404fc9 DeleteObject 4061->4062 4063 404fbc SendMessageW 4061->4063 4064 404fd2 4062->4064 4063->4062 4065 405009 4064->4065 4070 406544 17 API calls 4064->4070 4067 404463 18 API calls 4065->4067 4066 405229 4068 4052d5 4066->4068 4077 405282 SendMessageW 4066->4077 4103 40513a 4066->4103 4071 40501d 4067->4071 4072 4052e7 4068->4072 4073 4052df SendMessageW 4068->4073 4069->4066 4088 4051b6 4069->4088 4114 404e1e SendMessageW 4069->4114 4074 404feb SendMessageW SendMessageW 4070->4074 4076 404463 18 API calls 4071->4076 4080 405300 4072->4080 4081 4052f9 ImageList_Destroy 4072->4081 4089 405310 4072->4089 4073->4072 4074->4064 4094 40502e 4076->4094 4083 405297 SendMessageW 4077->4083 4077->4103 4078 40521b SendMessageW 4078->4066 4079 4044ca 8 API calls 4084 4054d6 4079->4084 4085 405309 GlobalFree 4080->4085 4080->4089 4081->4080 4082 40548a 4090 40549c ShowWindow GetDlgItem ShowWindow 4082->4090 4082->4103 4087 4052aa 4083->4087 4085->4089 4086 405109 GetWindowLongW SetWindowLongW 4091 405122 4086->4091 4098 4052bb SendMessageW 4087->4098 4088->4066 4088->4078 4089->4082 4105 40534b 4089->4105 4119 404e9e 4089->4119 4090->4103 4092 405127 ShowWindow 4091->4092 4093 40513f 4091->4093 4112 404498 SendMessageW 4092->4112 4113 404498 SendMessageW 4093->4113 4094->4086 4097 405081 SendMessageW 4094->4097 4099 405104 4094->4099 4100 4050d3 SendMessageW 4094->4100 4101 4050bf SendMessageW 4094->4101 4097->4094 4098->4068 4099->4086 4099->4091 4100->4094 4101->4094 4103->4079 4104 405455 4106 405460 InvalidateRect 4104->4106 4108 40546c 4104->4108 4107 405379 SendMessageW 4105->4107 4109 40538f 4105->4109 4106->4108 4107->4109 4108->4082 4128 404dd9 4108->4128 4109->4104 4110 405403 SendMessageW SendMessageW 4109->4110 4110->4109 4112->4103 4113->4069 4115 404e41 GetMessagePos ScreenToClient SendMessageW 4114->4115 4116 404e7d SendMessageW 4114->4116 4117 404e75 4115->4117 4118 404e7a 4115->4118 4116->4117 4117->4088 4118->4116 4131 406507 lstrcpynW 4119->4131 4121 404eb1 4132 40644e wsprintfW 4121->4132 4123 404ebb 4124 40140b 2 API calls 4123->4124 4125 404ec4 4124->4125 4133 406507 lstrcpynW 4125->4133 4127 404ecb 4127->4105 4134 404d10 4128->4134 4130 404dee 4130->4082 4131->4121 4132->4123 4133->4127 4135 404d29 4134->4135 4136 406544 17 API calls 4135->4136 4137 404d8d 4136->4137 4138 406544 17 API calls 4137->4138 4139 404d98 4138->4139 4140 406544 17 API calls 4139->4140 4141 404dae lstrlenW wsprintfW SetDlgItemTextW 4140->4141 4141->4130 4142 4045d3 lstrlenW 4143 4045f2 4142->4143 4144 4045f4 WideCharToMultiByte 4142->4144 4143->4144 4145 404954 4146 404980 4145->4146 4147 404991 4145->4147 4206 405b4b GetDlgItemTextW 4146->4206 4149 40499d GetDlgItem 4147->4149 4155 4049fc 4147->4155 4150 4049b1 4149->4150 4154 4049c5 SetWindowTextW 4150->4154 4158 405e81 4 API calls 4150->4158 4151 404ae0 4204 404c8f 4151->4204 4208 405b4b GetDlgItemTextW 4151->4208 4152 40498b 4153 40678e 5 API calls 4152->4153 4153->4147 4159 404463 18 API calls 4154->4159 4155->4151 4160 406544 17 API calls 4155->4160 4155->4204 4157 4044ca 8 API calls 4162 404ca3 4157->4162 4163 4049bb 4158->4163 4164 4049e1 4159->4164 4165 404a70 SHBrowseForFolderW 4160->4165 4161 404b10 4166 405ede 18 API calls 4161->4166 4163->4154 4170 405dd6 3 API calls 4163->4170 4167 404463 18 API calls 4164->4167 4165->4151 4168 404a88 CoTaskMemFree 4165->4168 4169 404b16 4166->4169 4171 4049ef 4167->4171 4172 405dd6 3 API calls 4168->4172 4209 406507 lstrcpynW 4169->4209 4170->4154 4207 404498 SendMessageW 4171->4207 4174 404a95 4172->4174 4177 404acc SetDlgItemTextW 4174->4177 4181 406544 17 API calls 4174->4181 4176 4049f5 4179 4068d4 5 API calls 4176->4179 4177->4151 4178 404b2d 4180 4068d4 5 API calls 4178->4180 4179->4155 4187 404b34 4180->4187 4182 404ab4 lstrcmpiW 4181->4182 4182->4177 4184 404ac5 lstrcatW 4182->4184 4183 404b75 4210 406507 lstrcpynW 4183->4210 4184->4177 4186 404b7c 4188 405e81 4 API calls 4186->4188 4187->4183 4192 405e22 2 API calls 4187->4192 4193 404bcd 4187->4193 4189 404b82 GetDiskFreeSpaceW 4188->4189 4191 404ba6 MulDiv 4189->4191 4189->4193 4191->4193 4192->4187 4195 404dd9 20 API calls 4193->4195 4203 404c3e 4193->4203 4194 404c61 4211 404485 KiUserCallbackDispatcher 4194->4211 4197 404c2b 4195->4197 4196 40140b 2 API calls 4196->4194 4199 404c40 SetDlgItemTextW 4197->4199 4200 404c30 4197->4200 4199->4203 4201 404d10 20 API calls 4200->4201 4201->4203 4202 404c7d 4202->4204 4212 4048ad 4202->4212 4203->4194 4203->4196 4204->4157 4206->4152 4207->4176 4208->4161 4209->4178 4210->4186 4211->4202 4213 4048c0 SendMessageW 4212->4213 4214 4048bb 4212->4214 4213->4204 4214->4213 4215 401956 4216 402da6 17 API calls 4215->4216 4217 40195d lstrlenW 4216->4217 4218 402638 4217->4218 4219 4014d7 4220 402d84 17 API calls 4219->4220 4221 4014dd Sleep 4220->4221 4223 402c2a 4221->4223 4224 4020d8 4225 40219c 4224->4225 4226 4020ea 4224->4226 4228 401423 24 API calls 4225->4228 4227 402da6 17 API calls 4226->4227 4229 4020f1 4227->4229 4234 4022f6 4228->4234 4230 402da6 17 API calls 4229->4230 4231 4020fa 4230->4231 4232 402110 LoadLibraryExW 4231->4232 4233 402102 GetModuleHandleW 4231->4233 4232->4225 4235 402121 4232->4235 4233->4232 4233->4235 4244 406943 4235->4244 4238 402132 4241 401423 24 API calls 4238->4241 4242 402142 4238->4242 4239 40216b 4240 405569 24 API calls 4239->4240 4240->4242 4241->4242 4242->4234 4243 40218e FreeLibrary 4242->4243 4243->4234 4249 406529 WideCharToMultiByte 4244->4249 4246 406960 4247 406967 GetProcAddress 4246->4247 4248 40212c 4246->4248 4247->4248 4248->4238 4248->4239 4249->4246 4250 402b59 4251 402b60 4250->4251 4252 402bab 4250->4252 4255 402d84 17 API calls 4251->4255 4258 402ba9 4251->4258 4253 4068d4 5 API calls 4252->4253 4254 402bb2 4253->4254 4256 402da6 17 API calls 4254->4256 4257 402b6e 4255->4257 4259 402bbb 4256->4259 4260 402d84 17 API calls 4257->4260 4259->4258 4261 402bbf IIDFromString 4259->4261 4263 402b7a 4260->4263 4261->4258 4262 402bce 4261->4262 4262->4258 4268 406507 lstrcpynW 4262->4268 4267 40644e wsprintfW 4263->4267 4265 402beb CoTaskMemFree 4265->4258 4267->4258 4268->4265 4269 402a5b 4270 402d84 17 API calls 4269->4270 4271 402a61 4270->4271 4272 402aa4 4271->4272 4273 402a88 4271->4273 4281 40292e 4271->4281 4275 402abe 4272->4275 4276 402aae 4272->4276 4274 402a8d 4273->4274 4277 402a9e 4273->4277 4283 406507 lstrcpynW 4274->4283 4279 406544 17 API calls 4275->4279 4278 402d84 17 API calls 4276->4278 4277->4281 4284 40644e wsprintfW 4277->4284 4278->4277 4279->4277 4283->4281 4284->4281 3857 403adc 3858 403af4 3857->3858 3859 403ae6 CloseHandle 3857->3859 3864 403b21 3858->3864 3859->3858 3865 403b2f 3864->3865 3866 403b34 FreeLibrary GlobalFree 3865->3866 3867 403af9 3865->3867 3866->3866 3866->3867 3868 405c13 3867->3868 3869 405ede 18 API calls 3868->3869 3870 405c33 3869->3870 3871 405c52 3870->3871 3872 405c3b DeleteFileW 3870->3872 3877 405d72 3871->3877 3904 406507 lstrcpynW 3871->3904 3900 403b05 3872->3900 3874 405c78 3875 405c8b 3874->3875 3876 405c7e lstrcatW 3874->3876 3879 405e22 2 API calls 3875->3879 3878 405c91 3876->3878 3880 40683d 2 API calls 3877->3880 3877->3900 3881 405ca1 lstrcatW 3878->3881 3883 405cac lstrlenW FindFirstFileW 3878->3883 3879->3878 3882 405d97 3880->3882 3881->3883 3884 405dd6 3 API calls 3882->3884 3882->3900 3883->3877 3903 405cce 3883->3903 3885 405da1 3884->3885 3888 405bcb 5 API calls 3885->3888 3887 405d55 FindNextFileW 3890 405d6b FindClose 3887->3890 3887->3903 3889 405dad 3888->3889 3891 405db1 3889->3891 3892 405dc7 3889->3892 3890->3877 3895 405569 24 API calls 3891->3895 3891->3900 3894 405569 24 API calls 3892->3894 3894->3900 3897 405dbe 3895->3897 3896 405c13 60 API calls 3896->3903 3899 4062c7 36 API calls 3897->3899 3898 405569 24 API calls 3898->3887 3899->3900 3901 405569 24 API calls 3901->3903 3902 4062c7 36 API calls 3902->3903 3903->3887 3903->3896 3903->3898 3903->3901 3903->3902 3905 406507 lstrcpynW 3903->3905 3906 405bcb 3903->3906 3904->3874 3905->3903 3914 405fd2 GetFileAttributesW 3906->3914 3909 405bf8 3909->3903 3910 405be6 RemoveDirectoryW 3912 405bf4 3910->3912 3911 405bee DeleteFileW 3911->3912 3912->3909 3913 405c04 SetFileAttributesW 3912->3913 3913->3909 3915 405bd7 3914->3915 3916 405fe4 SetFileAttributesW 3914->3916 3915->3909 3915->3910 3915->3911 3916->3915 4285 40175c 4286 402da6 17 API calls 4285->4286 4287 401763 4286->4287 4288 406026 2 API calls 4287->4288 4289 40176a 4288->4289 4289->4289 4290 401d5d 4291 402d84 17 API calls 4290->4291 4292 401d6e SetWindowLongW 4291->4292 4293 402c2a 4292->4293 4294 4054dd 4295 405501 4294->4295 4296 4054ed 4294->4296 4299 405509 IsWindowVisible 4295->4299 4305 405520 4295->4305 4297 4054f3 4296->4297 4298 40554a 4296->4298 4300 4044af SendMessageW 4297->4300 4302 40554f CallWindowProcW 4298->4302 4299->4298 4301 405516 4299->4301 4303 4054fd 4300->4303 4304 404e1e 5 API calls 4301->4304 4302->4303 4304->4305 4305->4302 4306 404e9e 4 API calls 4305->4306 4306->4298 3917 401ede 3925 402d84 3917->3925 3919 401ee4 3920 402d84 17 API calls 3919->3920 3921 401ef0 3920->3921 3922 401f07 EnableWindow 3921->3922 3923 401efc ShowWindow 3921->3923 3924 402c2a 3922->3924 3923->3924 3926 406544 17 API calls 3925->3926 3927 402d99 3926->3927 3927->3919 4307 4028de 4308 4028e6 4307->4308 4309 4028ea FindNextFileW 4308->4309 4311 4028fc 4308->4311 4310 402943 4309->4310 4309->4311 4313 406507 lstrcpynW 4310->4313 4313->4311 4321 401563 4322 402ba4 4321->4322 4325 40644e wsprintfW 4322->4325 4324 402ba9 4325->4324 3341 403f64 3342 403f7c 3341->3342 3343 4040dd 3341->3343 3342->3343 3344 403f88 3342->3344 3345 40412e 3343->3345 3346 4040ee GetDlgItem GetDlgItem 3343->3346 3347 403f93 SetWindowPos 3344->3347 3348 403fa6 3344->3348 3350 404188 3345->3350 3361 401389 2 API calls 3345->3361 3349 404463 18 API calls 3346->3349 3347->3348 3352 403ff1 3348->3352 3353 403faf ShowWindow 3348->3353 3354 404118 SetClassLongW 3349->3354 3355 4040d8 3350->3355 3414 4044af 3350->3414 3358 404010 3352->3358 3359 403ff9 DestroyWindow 3352->3359 3356 4040ca 3353->3356 3357 403fcf GetWindowLongW 3353->3357 3360 40140b 2 API calls 3354->3360 3436 4044ca 3356->3436 3357->3356 3364 403fe8 ShowWindow 3357->3364 3365 404015 SetWindowLongW 3358->3365 3366 404026 3358->3366 3413 4043ec 3359->3413 3360->3345 3362 404160 3361->3362 3362->3350 3367 404164 SendMessageW 3362->3367 3364->3352 3365->3355 3366->3356 3370 404032 GetDlgItem 3366->3370 3367->3355 3368 40140b 2 API calls 3383 40419a 3368->3383 3369 4043ee DestroyWindow KiUserCallbackDispatcher 3369->3413 3372 404060 3370->3372 3373 404043 SendMessageW IsWindowEnabled 3370->3373 3371 40441d ShowWindow 3371->3355 3375 40406d 3372->3375 3376 4040b4 SendMessageW 3372->3376 3377 404080 3372->3377 3387 404065 3372->3387 3373->3355 3373->3372 3374 406544 17 API calls 3374->3383 3375->3376 3375->3387 3376->3356 3380 404088 3377->3380 3381 40409d 3377->3381 3379 404463 18 API calls 3379->3383 3430 40140b 3380->3430 3385 40140b 2 API calls 3381->3385 3382 40409b 3382->3356 3383->3355 3383->3368 3383->3369 3383->3374 3383->3379 3404 40432e DestroyWindow 3383->3404 3417 404463 3383->3417 3386 4040a4 3385->3386 3386->3356 3386->3387 3433 40443c 3387->3433 3389 404215 GetDlgItem 3390 404232 ShowWindow KiUserCallbackDispatcher 3389->3390 3391 40422a 3389->3391 3420 404485 KiUserCallbackDispatcher 3390->3420 3391->3390 3393 40425c EnableWindow 3398 404270 3393->3398 3394 404275 GetSystemMenu EnableMenuItem SendMessageW 3395 4042a5 SendMessageW 3394->3395 3394->3398 3395->3398 3398->3394 3421 404498 SendMessageW 3398->3421 3422 403f45 3398->3422 3425 406507 lstrcpynW 3398->3425 3400 4042d4 lstrlenW 3401 406544 17 API calls 3400->3401 3402 4042ea SetWindowTextW 3401->3402 3426 401389 3402->3426 3405 404348 CreateDialogParamW 3404->3405 3404->3413 3406 40437b 3405->3406 3405->3413 3407 404463 18 API calls 3406->3407 3408 404386 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3407->3408 3409 401389 2 API calls 3408->3409 3410 4043cc 3409->3410 3410->3355 3411 4043d4 ShowWindow 3410->3411 3412 4044af SendMessageW 3411->3412 3412->3413 3413->3355 3413->3371 3415 4044c7 3414->3415 3416 4044b8 SendMessageW 3414->3416 3415->3383 3416->3415 3418 406544 17 API calls 3417->3418 3419 40446e SetDlgItemTextW 3418->3419 3419->3389 3420->3393 3421->3398 3423 406544 17 API calls 3422->3423 3424 403f53 SetWindowTextW 3423->3424 3424->3398 3425->3400 3428 401390 3426->3428 3427 4013fe 3427->3383 3428->3427 3429 4013cb MulDiv SendMessageW 3428->3429 3429->3428 3431 401389 2 API calls 3430->3431 3432 401420 3431->3432 3432->3387 3434 404443 3433->3434 3435 404449 SendMessageW 3433->3435 3434->3435 3435->3382 3437 4044e2 GetWindowLongW 3436->3437 3438 40458d 3436->3438 3437->3438 3439 4044f7 3437->3439 3438->3355 3439->3438 3440 404524 GetSysColor 3439->3440 3441 404527 3439->3441 3440->3441 3442 404537 SetBkMode 3441->3442 3443 40452d SetTextColor 3441->3443 3444 404555 3442->3444 3445 40454f GetSysColor 3442->3445 3443->3442 3446 404566 3444->3446 3447 40455c SetBkColor 3444->3447 3445->3444 3446->3438 3448 404580 CreateBrushIndirect 3446->3448 3449 404579 DeleteObject 3446->3449 3447->3446 3448->3438 3449->3448 4326 401968 4327 402d84 17 API calls 4326->4327 4328 40196f 4327->4328 4329 402d84 17 API calls 4328->4329 4330 40197c 4329->4330 4331 402da6 17 API calls 4330->4331 4332 401993 lstrlenW 4331->4332 4334 4019a4 4332->4334 4333 4019e5 4334->4333 4338 406507 lstrcpynW 4334->4338 4336 4019d5 4336->4333 4337 4019da lstrlenW 4336->4337 4337->4333 4338->4336 4339 40166a 4340 402da6 17 API calls 4339->4340 4341 401670 4340->4341 4342 40683d 2 API calls 4341->4342 4343 401676 4342->4343 4344 402aeb 4345 402d84 17 API calls 4344->4345 4346 402af1 4345->4346 4347 406544 17 API calls 4346->4347 4348 40292e 4346->4348 4347->4348 4349 4026ec 4350 402d84 17 API calls 4349->4350 4352 4026fb 4350->4352 4351 402838 4352->4351 4353 402745 ReadFile 4352->4353 4354 40607a ReadFile 4352->4354 4355 402785 MultiByteToWideChar 4352->4355 4356 40283a 4352->4356 4359 4027ab SetFilePointer MultiByteToWideChar 4352->4359 4360 40284b 4352->4360 4362 4060d8 SetFilePointer 4352->4362 4353->4351 4353->4352 4354->4352 4355->4352 4371 40644e wsprintfW 4356->4371 4359->4352 4360->4351 4361 40286c SetFilePointer 4360->4361 4361->4351 4363 4060f4 4362->4363 4366 40610c 4362->4366 4364 40607a ReadFile 4363->4364 4365 406100 4364->4365 4365->4366 4367 406115 SetFilePointer 4365->4367 4368 40613d SetFilePointer 4365->4368 4366->4352 4367->4368 4369 406120 4367->4369 4368->4366 4370 4060a9 WriteFile 4369->4370 4370->4366 4371->4351 3928 40176f 3929 402da6 17 API calls 3928->3929 3930 401776 3929->3930 3931 401796 3930->3931 3932 40179e 3930->3932 3967 406507 lstrcpynW 3931->3967 3968 406507 lstrcpynW 3932->3968 3935 40179c 3939 40678e 5 API calls 3935->3939 3936 4017a9 3937 405dd6 3 API calls 3936->3937 3938 4017af lstrcatW 3937->3938 3938->3935 3944 4017bb 3939->3944 3940 40683d 2 API calls 3940->3944 3941 405fd2 2 API calls 3941->3944 3943 4017cd CompareFileTime 3943->3944 3944->3940 3944->3941 3944->3943 3945 40188d 3944->3945 3951 406507 lstrcpynW 3944->3951 3954 406544 17 API calls 3944->3954 3960 405b67 MessageBoxIndirectW 3944->3960 3963 401864 3944->3963 3966 405ff7 GetFileAttributesW CreateFileW 3944->3966 3946 405569 24 API calls 3945->3946 3948 401897 3946->3948 3947 405569 24 API calls 3965 401879 3947->3965 3949 4032b4 35 API calls 3948->3949 3950 4018aa 3949->3950 3952 4018be SetFileTime 3950->3952 3953 4018d0 FindCloseChangeNotification 3950->3953 3951->3944 3952->3953 3955 4018e1 3953->3955 3953->3965 3954->3944 3956 4018e6 3955->3956 3957 4018f9 3955->3957 3958 406544 17 API calls 3956->3958 3959 406544 17 API calls 3957->3959 3961 4018ee lstrcatW 3958->3961 3962 401901 3959->3962 3960->3944 3961->3962 3964 405b67 MessageBoxIndirectW 3962->3964 3963->3947 3963->3965 3964->3965 3966->3944 3967->3935 3968->3936 4379 401a72 4380 402d84 17 API calls 4379->4380 4381 401a7b 4380->4381 4382 402d84 17 API calls 4381->4382 4383 401a20 4382->4383 4384 401573 4385 401583 ShowWindow 4384->4385 4386 40158c 4384->4386 4385->4386 4387 40159a ShowWindow 4386->4387 4388 402c2a 4386->4388 4387->4388 4389 403b74 4390 403b7f 4389->4390 4391 403b83 4390->4391 4392 403b86 GlobalAlloc 4390->4392 4392->4391 4393 4023f4 4394 402da6 17 API calls 4393->4394 4395 402403 4394->4395 4396 402da6 17 API calls 4395->4396 4397 40240c 4396->4397 4398 402da6 17 API calls 4397->4398 4399 402416 GetPrivateProfileStringW 4398->4399 4400 4014f5 SetForegroundWindow 4401 402c2a 4400->4401 4402 401ff6 4403 402da6 17 API calls 4402->4403 4404 401ffd 4403->4404 4405 40683d 2 API calls 4404->4405 4406 402003 4405->4406 4408 402014 4406->4408 4409 40644e wsprintfW 4406->4409 4409->4408 3450 4034f7 SetErrorMode GetVersionExW 3451 403581 3450->3451 3452 403549 GetVersionExW 3450->3452 3453 4035da 3451->3453 3454 4068d4 5 API calls 3451->3454 3452->3451 3455 406864 3 API calls 3453->3455 3454->3453 3456 4035f0 lstrlenA 3455->3456 3456->3453 3457 403600 3456->3457 3458 4068d4 5 API calls 3457->3458 3459 403607 3458->3459 3460 4068d4 5 API calls 3459->3460 3461 40360e 3460->3461 3462 4068d4 5 API calls 3461->3462 3463 40361a #17 OleInitialize SHGetFileInfoW 3462->3463 3540 406507 lstrcpynW 3463->3540 3466 403667 GetCommandLineW 3541 406507 lstrcpynW 3466->3541 3468 403679 3469 405e03 CharNextW 3468->3469 3470 40369f CharNextW 3469->3470 3476 4036b0 3470->3476 3471 4037ae 3472 4037c2 GetTempPathW 3471->3472 3542 4034c6 3472->3542 3474 4037da 3477 403834 DeleteFileW 3474->3477 3478 4037de GetWindowsDirectoryW lstrcatW 3474->3478 3475 405e03 CharNextW 3475->3476 3476->3471 3476->3475 3483 4037b0 3476->3483 3552 40307d GetTickCount GetModuleFileNameW 3477->3552 3480 4034c6 12 API calls 3478->3480 3481 4037fa 3480->3481 3481->3477 3482 4037fe GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3481->3482 3486 4034c6 12 API calls 3482->3486 3636 406507 lstrcpynW 3483->3636 3484 403847 3485 403a23 ExitProcess OleUninitialize 3484->3485 3487 4038fc 3484->3487 3494 405e03 CharNextW 3484->3494 3489 403a33 3485->3489 3490 403a48 3485->3490 3493 40382c 3486->3493 3580 403bb6 3487->3580 3662 405b67 3489->3662 3491 403a50 GetCurrentProcess OpenProcessToken 3490->3491 3492 403ac6 ExitProcess 3490->3492 3498 403a96 3491->3498 3499 403a67 LookupPrivilegeValueW AdjustTokenPrivileges 3491->3499 3493->3477 3493->3485 3509 403869 3494->3509 3502 4068d4 5 API calls 3498->3502 3499->3498 3500 40390b 3500->3485 3505 403a9d 3502->3505 3503 4038d2 3637 405ede 3503->3637 3504 403913 3508 405ad2 5 API calls 3504->3508 3507 403ab2 ExitWindowsEx 3505->3507 3511 403abf 3505->3511 3507->3492 3507->3511 3512 403918 lstrcatW 3508->3512 3509->3503 3509->3504 3513 40140b 2 API calls 3511->3513 3514 403934 lstrcatW lstrcmpiW 3512->3514 3515 403929 lstrcatW 3512->3515 3513->3492 3514->3500 3516 403954 3514->3516 3515->3514 3518 403960 3516->3518 3519 403959 3516->3519 3522 405ab5 2 API calls 3518->3522 3521 405a38 4 API calls 3519->3521 3520 4038f1 3652 406507 lstrcpynW 3520->3652 3524 40395e 3521->3524 3525 403965 SetCurrentDirectoryW 3522->3525 3524->3525 3526 403982 3525->3526 3527 403977 3525->3527 3654 406507 lstrcpynW 3526->3654 3653 406507 lstrcpynW 3527->3653 3530 406544 17 API calls 3531 4039c4 DeleteFileW 3530->3531 3532 4039d0 CopyFileW 3531->3532 3537 40398f 3531->3537 3532->3537 3533 403a1a 3535 4062c7 36 API calls 3533->3535 3535->3500 3536 406544 17 API calls 3536->3537 3537->3530 3537->3533 3537->3536 3539 403a04 CloseHandle 3537->3539 3655 4062c7 MoveFileExW 3537->3655 3659 405aea CreateProcessW 3537->3659 3539->3537 3540->3466 3541->3468 3543 40678e 5 API calls 3542->3543 3544 4034d2 3543->3544 3545 4034dc 3544->3545 3666 405dd6 lstrlenW CharPrevW 3544->3666 3545->3474 3548 405ab5 2 API calls 3549 4034ea 3548->3549 3669 406026 3549->3669 3673 405ff7 GetFileAttributesW CreateFileW 3552->3673 3554 4030bd 3555 4030cd 3554->3555 3674 406507 lstrcpynW 3554->3674 3555->3484 3557 4030e3 3675 405e22 lstrlenW 3557->3675 3561 4030f4 GetFileSize 3576 4031ee 3561->3576 3579 40310b 3561->3579 3563 4031f7 3563->3555 3565 403227 GlobalAlloc 3563->3565 3716 4034af SetFilePointer 3563->3716 3691 4034af SetFilePointer 3565->3691 3567 40325a 3569 403019 6 API calls 3567->3569 3569->3555 3570 403210 3572 403499 ReadFile 3570->3572 3571 403242 3692 4032b4 3571->3692 3574 40321b 3572->3574 3574->3555 3574->3565 3575 403019 6 API calls 3575->3579 3680 403019 3576->3680 3577 40324e 3577->3555 3577->3577 3578 40328b SetFilePointer 3577->3578 3578->3555 3579->3555 3579->3567 3579->3575 3579->3576 3713 403499 3579->3713 3581 4068d4 5 API calls 3580->3581 3582 403bca 3581->3582 3583 403bd0 GetUserDefaultUILanguage 3582->3583 3584 403be2 3582->3584 3729 40644e wsprintfW 3583->3729 3585 4063d5 3 API calls 3584->3585 3588 403c12 3585->3588 3587 403be0 3730 403e8c 3587->3730 3589 403c31 lstrcatW 3588->3589 3590 4063d5 3 API calls 3588->3590 3589->3587 3590->3589 3593 405ede 18 API calls 3594 403c63 3593->3594 3595 403cf7 3594->3595 3598 4063d5 3 API calls 3594->3598 3596 405ede 18 API calls 3595->3596 3597 403cfd 3596->3597 3599 403d0d LoadImageW 3597->3599 3601 406544 17 API calls 3597->3601 3600 403c95 3598->3600 3602 403db3 3599->3602 3603 403d34 RegisterClassW 3599->3603 3600->3595 3604 403cb6 lstrlenW 3600->3604 3608 405e03 CharNextW 3600->3608 3601->3599 3607 40140b 2 API calls 3602->3607 3605 403dbd 3603->3605 3606 403d6a SystemParametersInfoW CreateWindowExW 3603->3606 3609 403cc4 lstrcmpiW 3604->3609 3610 403cea 3604->3610 3605->3500 3606->3602 3611 403db9 3607->3611 3612 403cb3 3608->3612 3609->3610 3613 403cd4 GetFileAttributesW 3609->3613 3614 405dd6 3 API calls 3610->3614 3611->3605 3616 403e8c 18 API calls 3611->3616 3612->3604 3615 403ce0 3613->3615 3617 403cf0 3614->3617 3615->3610 3618 405e22 2 API calls 3615->3618 3619 403dca 3616->3619 3745 406507 lstrcpynW 3617->3745 3618->3610 3621 403dd6 ShowWindow 3619->3621 3622 403e59 3619->3622 3624 406864 3 API calls 3621->3624 3738 40563c OleInitialize 3622->3738 3626 403dee 3624->3626 3625 403e5f 3628 403e63 3625->3628 3629 403e7b 3625->3629 3627 403dfc GetClassInfoW 3626->3627 3630 406864 3 API calls 3626->3630 3632 403e10 GetClassInfoW RegisterClassW 3627->3632 3633 403e26 DialogBoxParamW 3627->3633 3628->3605 3635 40140b 2 API calls 3628->3635 3631 40140b 2 API calls 3629->3631 3630->3627 3631->3605 3632->3633 3634 40140b 2 API calls 3633->3634 3634->3605 3635->3605 3636->3472 3747 406507 lstrcpynW 3637->3747 3639 405eef 3640 405e81 4 API calls 3639->3640 3641 405ef5 3640->3641 3642 4038de 3641->3642 3643 40678e 5 API calls 3641->3643 3642->3485 3651 406507 lstrcpynW 3642->3651 3649 405f05 3643->3649 3644 405f36 lstrlenW 3645 405f41 3644->3645 3644->3649 3647 405dd6 3 API calls 3645->3647 3648 405f46 GetFileAttributesW 3647->3648 3648->3642 3649->3642 3649->3644 3650 405e22 2 API calls 3649->3650 3748 40683d FindFirstFileW 3649->3748 3650->3644 3651->3520 3652->3487 3653->3526 3654->3537 3656 4062e8 3655->3656 3657 4062db 3655->3657 3656->3537 3751 40614d 3657->3751 3660 405b29 3659->3660 3661 405b1d CloseHandle 3659->3661 3660->3537 3661->3660 3663 405b7c 3662->3663 3664 403a40 ExitProcess 3663->3664 3665 405b90 MessageBoxIndirectW 3663->3665 3665->3664 3667 405df2 lstrcatW 3666->3667 3668 4034e4 3666->3668 3667->3668 3668->3548 3670 406033 GetTickCount GetTempFileNameW 3669->3670 3671 4034f5 3670->3671 3672 406069 3670->3672 3671->3474 3672->3670 3672->3671 3673->3554 3674->3557 3676 405e30 3675->3676 3677 4030e9 3676->3677 3678 405e36 CharPrevW 3676->3678 3679 406507 lstrcpynW 3677->3679 3678->3676 3678->3677 3679->3561 3681 403022 3680->3681 3682 40303a 3680->3682 3683 403032 3681->3683 3684 40302b DestroyWindow 3681->3684 3685 403042 3682->3685 3686 40304a GetTickCount 3682->3686 3683->3563 3684->3683 3687 406910 2 API calls 3685->3687 3688 403058 CreateDialogParamW ShowWindow 3686->3688 3689 40307b 3686->3689 3690 403048 3687->3690 3688->3689 3689->3563 3690->3563 3691->3571 3693 4032cd 3692->3693 3694 4032f8 3693->3694 3726 4034af SetFilePointer 3693->3726 3696 403499 ReadFile 3694->3696 3697 403303 3696->3697 3698 403423 3697->3698 3699 403315 GetTickCount 3697->3699 3700 403439 3697->3700 3698->3577 3708 403328 3699->3708 3701 40343d 3700->3701 3705 403455 3700->3705 3702 403499 ReadFile 3701->3702 3702->3698 3703 403499 ReadFile 3703->3705 3704 403499 ReadFile 3704->3708 3705->3698 3705->3703 3706 4060a9 WriteFile 3705->3706 3706->3705 3708->3698 3708->3704 3709 40338e GetTickCount 3708->3709 3710 4033b7 MulDiv wsprintfW 3708->3710 3717 406a4f 3708->3717 3724 4060a9 WriteFile 3708->3724 3709->3708 3711 405569 24 API calls 3710->3711 3711->3708 3727 40607a ReadFile 3713->3727 3716->3570 3718 406a74 3717->3718 3721 406a7c 3717->3721 3718->3708 3719 406b03 GlobalFree 3720 406b0c GlobalAlloc 3719->3720 3720->3718 3720->3721 3721->3718 3721->3719 3721->3720 3722 406b83 GlobalAlloc 3721->3722 3723 406b7a GlobalFree 3721->3723 3722->3718 3722->3721 3723->3722 3725 4060c7 3724->3725 3725->3708 3726->3694 3728 4034ac 3727->3728 3728->3579 3729->3587 3731 403ea0 3730->3731 3746 40644e wsprintfW 3731->3746 3733 403f11 3734 403f45 18 API calls 3733->3734 3736 403f16 3734->3736 3735 403c41 3735->3593 3736->3735 3737 406544 17 API calls 3736->3737 3737->3736 3739 4044af SendMessageW 3738->3739 3740 40565f 3739->3740 3743 401389 2 API calls 3740->3743 3744 405686 3740->3744 3741 4044af SendMessageW 3742 405698 OleUninitialize 3741->3742 3742->3625 3743->3740 3744->3741 3745->3595 3746->3733 3747->3639 3749 406853 FindClose 3748->3749 3750 40685e 3748->3750 3749->3750 3750->3649 3752 4061a3 GetShortPathNameW 3751->3752 3753 40617d 3751->3753 3755 4062c2 3752->3755 3756 4061b8 3752->3756 3778 405ff7 GetFileAttributesW CreateFileW 3753->3778 3755->3656 3756->3755 3758 4061c0 wsprintfA 3756->3758 3757 406187 CloseHandle GetShortPathNameW 3757->3755 3759 40619b 3757->3759 3760 406544 17 API calls 3758->3760 3759->3752 3759->3755 3761 4061e8 3760->3761 3779 405ff7 GetFileAttributesW CreateFileW 3761->3779 3763 4061f5 3763->3755 3764 406204 GetFileSize GlobalAlloc 3763->3764 3765 406226 3764->3765 3766 4062bb CloseHandle 3764->3766 3767 40607a ReadFile 3765->3767 3766->3755 3768 40622e 3767->3768 3768->3766 3780 405f5c lstrlenA 3768->3780 3771 406245 lstrcpyA 3776 406267 3771->3776 3772 406259 3773 405f5c 4 API calls 3772->3773 3773->3776 3774 40629e SetFilePointer 3775 4060a9 WriteFile 3774->3775 3777 4062b4 GlobalFree 3775->3777 3776->3774 3777->3766 3778->3757 3779->3763 3781 405f9d lstrlenA 3780->3781 3782 405fa5 3781->3782 3783 405f76 lstrcmpiA 3781->3783 3782->3771 3782->3772 3783->3782 3784 405f94 CharNextA 3783->3784 3784->3781 4410 401b77 4411 402da6 17 API calls 4410->4411 4412 401b7e 4411->4412 4413 402d84 17 API calls 4412->4413 4414 401b87 wsprintfW 4413->4414 4415 402c2a 4414->4415 4416 40167b 4417 402da6 17 API calls 4416->4417 4418 401682 4417->4418 4419 402da6 17 API calls 4418->4419 4420 40168b 4419->4420 4421 402da6 17 API calls 4420->4421 4422 401694 MoveFileW 4421->4422 4423 4016a7 4422->4423 4429 4016a0 4422->4429 4424 4022f6 4423->4424 4425 40683d 2 API calls 4423->4425 4427 4016b6 4425->4427 4426 401423 24 API calls 4426->4424 4427->4424 4428 4062c7 36 API calls 4427->4428 4428->4429 4429->4426 4430 406bfe 4431 406a82 4430->4431 4432 4073ed 4431->4432 4433 406b03 GlobalFree 4431->4433 4434 406b0c GlobalAlloc 4431->4434 4435 406b83 GlobalAlloc 4431->4435 4436 406b7a GlobalFree 4431->4436 4433->4434 4434->4431 4434->4432 4435->4431 4435->4432 4436->4435 4437 4019ff 4438 402da6 17 API calls 4437->4438 4439 401a06 4438->4439 4440 402da6 17 API calls 4439->4440 4441 401a0f 4440->4441 4442 401a16 lstrcmpiW 4441->4442 4443 401a28 lstrcmpW 4441->4443 4444 401a1c 4442->4444 4443->4444 4445 4022ff 4446 402da6 17 API calls 4445->4446 4447 402305 4446->4447 4448 402da6 17 API calls 4447->4448 4449 40230e 4448->4449 4450 402da6 17 API calls 4449->4450 4451 402317 4450->4451 4452 40683d 2 API calls 4451->4452 4453 402320 4452->4453 4454 402331 lstrlenW lstrlenW 4453->4454 4455 402324 4453->4455 4456 405569 24 API calls 4454->4456 4457 405569 24 API calls 4455->4457 4459 40232c 4455->4459 4458 40236f SHFileOperationW 4456->4458 4457->4459 4458->4455 4458->4459 4460 401000 4461 401037 BeginPaint GetClientRect 4460->4461 4462 40100c DefWindowProcW 4460->4462 4464 4010f3 4461->4464 4465 401179 4462->4465 4466 401073 CreateBrushIndirect FillRect DeleteObject 4464->4466 4467 4010fc 4464->4467 4466->4464 4468 401102 CreateFontIndirectW 4467->4468 4469 401167 EndPaint 4467->4469 4468->4469 4470 401112 6 API calls 4468->4470 4469->4465 4470->4469 4471 401d81 4472 401d94 GetDlgItem 4471->4472 4473 401d87 4471->4473 4475 401d8e 4472->4475 4474 402d84 17 API calls 4473->4474 4474->4475 4476 401dd5 GetClientRect LoadImageW SendMessageW 4475->4476 4477 402da6 17 API calls 4475->4477 4479 401e33 4476->4479 4481 401e3f 4476->4481 4477->4476 4480 401e38 DeleteObject 4479->4480 4479->4481 4480->4481 4482 401503 4483 40151e 4482->4483 4484 40150b 4482->4484 4485 402d84 17 API calls 4484->4485 4485->4483 4486 402383 4487 40238a 4486->4487 4490 40239d 4486->4490 4488 406544 17 API calls 4487->4488 4489 402397 4488->4489 4491 405b67 MessageBoxIndirectW 4489->4491 4491->4490 4492 402c05 SendMessageW 4493 402c2a 4492->4493 4494 402c1f InvalidateRect 4492->4494 4494->4493 4502 40248a 4503 402da6 17 API calls 4502->4503 4504 40249c 4503->4504 4505 402da6 17 API calls 4504->4505 4506 4024a6 4505->4506 4519 402e36 4506->4519 4509 40292e 4510 4024de 4512 4024ea 4510->4512 4514 402d84 17 API calls 4510->4514 4511 402da6 17 API calls 4513 4024d4 lstrlenW 4511->4513 4515 402509 RegSetValueExW 4512->4515 4516 4032b4 35 API calls 4512->4516 4513->4510 4514->4512 4517 40251f RegCloseKey 4515->4517 4516->4515 4517->4509 4520 402e51 4519->4520 4523 4063a2 4520->4523 4524 4063b1 4523->4524 4525 4063bc RegCreateKeyExW 4524->4525 4526 4024b6 4524->4526 4525->4526 4526->4509 4526->4510 4526->4511 4527 40290b 4528 402da6 17 API calls 4527->4528 4529 402912 FindFirstFileW 4528->4529 4530 40293a 4529->4530 4533 402925 4529->4533 4535 40644e wsprintfW 4530->4535 4532 402943 4536 406507 lstrcpynW 4532->4536 4535->4532 4536->4533 4537 40190c 4538 401943 4537->4538 4539 402da6 17 API calls 4538->4539 4540 401948 4539->4540 4541 405c13 67 API calls 4540->4541 4542 401951 4541->4542 4543 40490d 4544 404943 4543->4544 4545 40491d 4543->4545 4547 4044ca 8 API calls 4544->4547 4546 404463 18 API calls 4545->4546 4548 40492a SetDlgItemTextW 4546->4548 4549 40494f 4547->4549 4548->4544 4550 40190f 4551 402da6 17 API calls 4550->4551 4552 401916 4551->4552 4553 405b67 MessageBoxIndirectW 4552->4553 4554 40191f 4553->4554 4555 401491 4556 405569 24 API calls 4555->4556 4557 401498 4556->4557 4558 402891 4559 402898 4558->4559 4560 402ba9 4558->4560 4561 402d84 17 API calls 4559->4561 4562 40289f 4561->4562 4563 4028ae SetFilePointer 4562->4563 4563->4560 4564 4028be 4563->4564 4566 40644e wsprintfW 4564->4566 4566->4560 3314 401f12 3315 402da6 17 API calls 3314->3315 3316 401f18 3315->3316 3317 402da6 17 API calls 3316->3317 3318 401f21 3317->3318 3319 402da6 17 API calls 3318->3319 3320 401f2a 3319->3320 3321 402da6 17 API calls 3320->3321 3322 401f33 3321->3322 3323 401423 24 API calls 3322->3323 3324 401f3a 3323->3324 3331 405b2d ShellExecuteExW 3324->3331 3326 401f82 3327 40292e 3326->3327 3332 40697f WaitForSingleObject 3326->3332 3329 401f9f CloseHandle 3329->3327 3331->3326 3333 406999 3332->3333 3334 4069ab GetExitCodeProcess 3333->3334 3337 406910 3333->3337 3334->3329 3338 40692d PeekMessageW 3337->3338 3339 406923 DispatchMessageW 3338->3339 3340 40693d WaitForSingleObject 3338->3340 3339->3338 3340->3333 4567 402f93 4568 402fa5 SetTimer 4567->4568 4569 402fbe 4567->4569 4568->4569 4570 403013 4569->4570 4571 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4569->4571 4571->4570 4572 401d17 4573 402d84 17 API calls 4572->4573 4574 401d1d IsWindow 4573->4574 4575 401a20 4574->4575 4576 404599 lstrcpynW lstrlenW 3834 401b9b 3835 401bec 3834->3835 3840 401ba8 3834->3840 3836 401bf1 3835->3836 3837 401c16 GlobalAlloc 3835->3837 3845 40239d 3836->3845 3853 406507 lstrcpynW 3836->3853 3838 406544 17 API calls 3837->3838 3842 401c31 3838->3842 3839 406544 17 API calls 3843 402397 3839->3843 3840->3842 3844 401bbf 3840->3844 3842->3839 3842->3845 3848 405b67 MessageBoxIndirectW 3843->3848 3854 406507 lstrcpynW 3844->3854 3846 401c03 GlobalFree 3846->3845 3848->3845 3849 401bce 3855 406507 lstrcpynW 3849->3855 3851 401bdd 3856 406507 lstrcpynW 3851->3856 3853->3846 3854->3849 3855->3851 3856->3845 4577 40261c 4578 402da6 17 API calls 4577->4578 4579 402623 4578->4579 4582 405ff7 GetFileAttributesW CreateFileW 4579->4582 4581 40262f 4582->4581 4590 40149e 4591 4014ac PostQuitMessage 4590->4591 4592 40239d 4590->4592 4591->4592 4593 40259e 4603 402de6 4593->4603 4596 402d84 17 API calls 4597 4025b1 4596->4597 4598 4025d9 RegEnumValueW 4597->4598 4599 4025cd RegEnumKeyW 4597->4599 4601 40292e 4597->4601 4600 4025ee RegCloseKey 4598->4600 4599->4600 4600->4601 4604 402da6 17 API calls 4603->4604 4605 402dfd 4604->4605 4606 406374 RegOpenKeyExW 4605->4606 4607 4025a8 4606->4607 4607->4596 4608 404622 4609 40463a 4608->4609 4616 404754 4608->4616 4613 404463 18 API calls 4609->4613 4610 4047be 4611 404888 4610->4611 4612 4047c8 GetDlgItem 4610->4612 4619 4044ca 8 API calls 4611->4619 4614 4047e2 4612->4614 4615 404849 4612->4615 4618 4046a1 4613->4618 4614->4615 4623 404808 SendMessageW LoadCursorW SetCursor 4614->4623 4615->4611 4624 40485b 4615->4624 4616->4610 4616->4611 4617 40478f GetDlgItem SendMessageW 4616->4617 4641 404485 KiUserCallbackDispatcher 4617->4641 4621 404463 18 API calls 4618->4621 4622 404883 4619->4622 4626 4046ae CheckDlgButton 4621->4626 4642 4048d1 4623->4642 4628 404871 4624->4628 4629 404861 SendMessageW 4624->4629 4625 4047b9 4631 4048ad SendMessageW 4625->4631 4639 404485 KiUserCallbackDispatcher 4626->4639 4628->4622 4630 404877 SendMessageW 4628->4630 4629->4628 4630->4622 4631->4610 4634 4046cc GetDlgItem 4640 404498 SendMessageW 4634->4640 4636 4046e2 SendMessageW 4637 404708 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4636->4637 4638 4046ff GetSysColor 4636->4638 4637->4622 4638->4637 4639->4634 4640->4636 4641->4625 4645 405b2d ShellExecuteExW 4642->4645 4644 404837 LoadCursorW SetCursor 4644->4615 4645->4644 4646 4015a3 4647 402da6 17 API calls 4646->4647 4648 4015aa SetFileAttributesW 4647->4648 4649 4015bc 4648->4649 4650 401fa4 4651 402da6 17 API calls 4650->4651 4652 401faa 4651->4652 4653 405569 24 API calls 4652->4653 4654 401fb4 4653->4654 4655 405aea 2 API calls 4654->4655 4656 401fba 4655->4656 4657 401fdd CloseHandle 4656->4657 4658 40697f 5 API calls 4656->4658 4661 40292e 4656->4661 4657->4661 4660 401fcf 4658->4660 4660->4657 4663 40644e wsprintfW 4660->4663 4663->4657 3785 4056a8 3786 405852 3785->3786 3787 4056c9 GetDlgItem GetDlgItem GetDlgItem 3785->3787 3789 405883 3786->3789 3790 40585b GetDlgItem CreateThread FindCloseChangeNotification 3786->3790 3830 404498 SendMessageW 3787->3830 3792 4058ae 3789->3792 3793 4058d3 3789->3793 3794 40589a ShowWindow ShowWindow 3789->3794 3790->3789 3833 40563c 5 API calls 3790->3833 3791 405739 3797 405740 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3791->3797 3795 40590e 3792->3795 3799 4058c2 3792->3799 3800 4058e8 ShowWindow 3792->3800 3796 4044ca 8 API calls 3793->3796 3832 404498 SendMessageW 3794->3832 3795->3793 3806 40591c SendMessageW 3795->3806 3811 4058e1 3796->3811 3804 405792 SendMessageW SendMessageW 3797->3804 3805 4057ae 3797->3805 3801 40443c SendMessageW 3799->3801 3802 405908 3800->3802 3803 4058fa 3800->3803 3801->3793 3808 40443c SendMessageW 3802->3808 3807 405569 24 API calls 3803->3807 3804->3805 3809 4057c1 3805->3809 3810 4057b3 SendMessageW 3805->3810 3806->3811 3812 405935 CreatePopupMenu 3806->3812 3807->3802 3808->3795 3814 404463 18 API calls 3809->3814 3810->3809 3813 406544 17 API calls 3812->3813 3815 405945 AppendMenuW 3813->3815 3816 4057d1 3814->3816 3819 405962 GetWindowRect 3815->3819 3820 405975 TrackPopupMenu 3815->3820 3817 4057da ShowWindow 3816->3817 3818 40580e GetDlgItem SendMessageW 3816->3818 3821 4057f0 ShowWindow 3817->3821 3822 4057fd 3817->3822 3818->3811 3824 405835 SendMessageW SendMessageW 3818->3824 3819->3820 3820->3811 3823 405990 3820->3823 3821->3822 3831 404498 SendMessageW 3822->3831 3825 4059ac SendMessageW 3823->3825 3824->3811 3825->3825 3826 4059c9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3825->3826 3828 4059ee SendMessageW 3826->3828 3828->3828 3829 405a17 GlobalUnlock SetClipboardData CloseClipboard 3828->3829 3829->3811 3830->3791 3831->3818 3832->3792 4664 40202a 4665 402da6 17 API calls 4664->4665 4666 402031 4665->4666 4667 4068d4 5 API calls 4666->4667 4668 402040 4667->4668 4669 4020cc 4668->4669 4670 40205c GlobalAlloc 4668->4670 4670->4669 4671 402070 4670->4671 4672 4068d4 5 API calls 4671->4672 4673 402077 4672->4673 4674 4068d4 5 API calls 4673->4674 4675 402081 4674->4675 4675->4669 4679 40644e wsprintfW 4675->4679 4677 4020ba 4680 40644e wsprintfW 4677->4680 4679->4677 4680->4669 4681 40252a 4682 402de6 17 API calls 4681->4682 4683 402534 4682->4683 4684 402da6 17 API calls 4683->4684 4685 40253d 4684->4685 4686 402548 RegQueryValueExW 4685->4686 4689 40292e 4685->4689 4687 402568 4686->4687 4688 40256e RegCloseKey 4686->4688 4687->4688 4692 40644e wsprintfW 4687->4692 4688->4689 4692->4688 4693 404caa 4694 404cd6 4693->4694 4695 404cba 4693->4695 4697 404d09 4694->4697 4698 404cdc SHGetPathFromIDListW 4694->4698 4704 405b4b GetDlgItemTextW 4695->4704 4700 404cf3 SendMessageW 4698->4700 4701 404cec 4698->4701 4699 404cc7 SendMessageW 4699->4694 4700->4697 4702 40140b 2 API calls 4701->4702 4702->4700 4704->4699 4705 4021aa 4706 402da6 17 API calls 4705->4706 4707 4021b1 4706->4707 4708 402da6 17 API calls 4707->4708 4709 4021bb 4708->4709 4710 402da6 17 API calls 4709->4710 4711 4021c5 4710->4711 4712 402da6 17 API calls 4711->4712 4713 4021cf 4712->4713 4714 402da6 17 API calls 4713->4714 4715 4021d9 4714->4715 4716 402218 CoCreateInstance 4715->4716 4717 402da6 17 API calls 4715->4717 4718 402237 4716->4718 4717->4716 4719 401423 24 API calls 4718->4719 4720 4022f6 4718->4720 4719->4720 4721 401a30 4722 402da6 17 API calls 4721->4722 4723 401a39 ExpandEnvironmentStringsW 4722->4723 4724 401a4d 4723->4724 4726 401a60 4723->4726 4725 401a52 lstrcmpW 4724->4725 4724->4726 4725->4726 4732 4023b2 4733 4023ba 4732->4733 4735 4023c0 4732->4735 4734 402da6 17 API calls 4733->4734 4734->4735 4736 402da6 17 API calls 4735->4736 4739 4023ce 4735->4739 4736->4739 4737 402da6 17 API calls 4740 4023dc 4737->4740 4738 402da6 17 API calls 4741 4023e5 WritePrivateProfileStringW 4738->4741 4739->4737 4739->4740 4740->4738 4749 402434 4750 402467 4749->4750 4751 40243c 4749->4751 4752 402da6 17 API calls 4750->4752 4753 402de6 17 API calls 4751->4753 4754 40246e 4752->4754 4755 402443 4753->4755 4760 402e64 4754->4760 4757 402da6 17 API calls 4755->4757 4759 40247b 4755->4759 4758 402454 RegDeleteValueW RegCloseKey 4757->4758 4758->4759 4761 402e78 4760->4761 4763 402e71 4760->4763 4761->4763 4764 402ea9 4761->4764 4763->4759 4765 406374 RegOpenKeyExW 4764->4765 4766 402ed7 4765->4766 4767 402ee7 RegEnumValueW 4766->4767 4771 402f0a 4766->4771 4775 402f81 4766->4775 4768 402f71 RegCloseKey 4767->4768 4767->4771 4768->4775 4769 402f46 RegEnumKeyW 4770 402f4f RegCloseKey 4769->4770 4769->4771 4772 4068d4 5 API calls 4770->4772 4771->4768 4771->4769 4771->4770 4773 402ea9 6 API calls 4771->4773 4774 402f5f 4772->4774 4773->4771 4774->4775 4776 402f63 RegDeleteKeyW 4774->4776 4775->4763 4776->4775 4784 401735 4785 402da6 17 API calls 4784->4785 4786 40173c SearchPathW 4785->4786 4787 401757 4786->4787 4788 401d38 4789 402d84 17 API calls 4788->4789 4790 401d3f 4789->4790 4791 402d84 17 API calls 4790->4791 4792 401d4b GetDlgItem 4791->4792 4793 402638 4792->4793 4794 4014b8 4795 4014be 4794->4795 4796 401389 2 API calls 4795->4796 4797 4014c6 4796->4797 4805 40263e 4806 402652 4805->4806 4807 40266d 4805->4807 4810 402d84 17 API calls 4806->4810 4808 402672 4807->4808 4809 40269d 4807->4809 4811 402da6 17 API calls 4808->4811 4812 402da6 17 API calls 4809->4812 4817 402659 4810->4817 4813 402679 4811->4813 4814 4026a4 lstrlenW 4812->4814 4822 406529 WideCharToMultiByte 4813->4822 4814->4817 4816 40268d lstrlenA 4816->4817 4818 4026e7 4817->4818 4820 4060d8 5 API calls 4817->4820 4821 4026d1 4817->4821 4819 4060a9 WriteFile 4819->4818 4820->4821 4821->4818 4821->4819 4822->4816

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 0 4034f7-403547 SetErrorMode GetVersionExW 1 403581-403588 0->1 2 403549-40357d GetVersionExW 0->2 3 403592-4035d2 1->3 4 40358a 1->4 2->1 5 4035d4-4035dc call 4068d4 3->5 6 4035e5 3->6 4->3 5->6 11 4035de 5->11 8 4035ea-4035fe call 406864 lstrlenA 6->8 13 403600-40361c call 4068d4 * 3 8->13 11->6 20 40362d-40368f #17 OleInitialize SHGetFileInfoW call 406507 GetCommandLineW call 406507 13->20 21 40361e-403624 13->21 28 403691-403693 20->28 29 403698-4036ab call 405e03 CharNextW 20->29 21->20 25 403626 21->25 25->20 28->29 32 4037a2-4037a8 29->32 33 4036b0-4036b6 32->33 34 4037ae 32->34 35 4036b8-4036bd 33->35 36 4036bf-4036c5 33->36 37 4037c2-4037dc GetTempPathW call 4034c6 34->37 35->35 35->36 38 4036c7-4036cb 36->38 39 4036cc-4036d0 36->39 47 403834-40384c DeleteFileW call 40307d 37->47 48 4037de-4037fc GetWindowsDirectoryW lstrcatW call 4034c6 37->48 38->39 41 403790-40379e call 405e03 39->41 42 4036d6-4036dc 39->42 41->32 59 4037a0-4037a1 41->59 45 4036f6-40372f 42->45 46 4036de-4036e5 42->46 53 403731-403736 45->53 54 40374b-403785 45->54 51 4036e7-4036ea 46->51 52 4036ec 46->52 64 403852-403858 47->64 65 403a23-403a31 ExitProcess OleUninitialize 47->65 48->47 62 4037fe-40382e GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034c6 48->62 51->45 51->52 52->45 53->54 61 403738-403740 53->61 57 403787-40378b 54->57 58 40378d-40378f 54->58 57->58 63 4037b0-4037bd call 406507 57->63 58->41 59->32 66 403742-403745 61->66 67 403747 61->67 62->47 62->65 63->37 69 40385e-403871 call 405e03 64->69 70 4038ff-403906 call 403bb6 64->70 72 403a33-403a42 call 405b67 ExitProcess 65->72 73 403a48-403a4e 65->73 66->54 66->67 67->54 88 4038c3-4038d0 69->88 89 403873-4038a8 69->89 84 40390b-40390e 70->84 74 403a50-403a65 GetCurrentProcess OpenProcessToken 73->74 75 403ac6-403ace 73->75 81 403a96-403aa4 call 4068d4 74->81 82 403a67-403a90 LookupPrivilegeValueW AdjustTokenPrivileges 74->82 85 403ad0 75->85 86 403ad3-403ad6 ExitProcess 75->86 95 403ab2-403abd ExitWindowsEx 81->95 96 403aa6-403ab0 81->96 82->81 84->65 85->86 90 4038d2-4038e0 call 405ede 88->90 91 403913-403927 call 405ad2 lstrcatW 88->91 93 4038aa-4038ae 89->93 90->65 104 4038e6-4038fc call 406507 * 2 90->104 107 403934-40394e lstrcatW lstrcmpiW 91->107 108 403929-40392f lstrcatW 91->108 98 4038b0-4038b5 93->98 99 4038b7-4038bf 93->99 95->75 101 403abf-403ac1 call 40140b 95->101 96->95 96->101 98->99 103 4038c1 98->103 99->93 99->103 101->75 103->88 104->70 109 403a21 107->109 110 403954-403957 107->110 108->107 109->65 112 403960 call 405ab5 110->112 113 403959-40395e call 405a38 110->113 119 403965-403975 SetCurrentDirectoryW 112->119 113->119 121 403982-4039ae call 406507 119->121 122 403977-40397d call 406507 119->122 126 4039b3-4039ce call 406544 DeleteFileW 121->126 122->121 129 4039d0-4039e0 CopyFileW 126->129 130 403a0e-403a18 126->130 129->130 131 4039e2-403a02 call 4062c7 call 406544 call 405aea 129->131 130->126 132 403a1a-403a1c call 4062c7 130->132 131->130 140 403a04-403a0b CloseHandle 131->140 132->109 140->130
                                                                                                                  APIs
                                                                                                                  • SetErrorMode.KERNELBASE(00008001), ref: 0040351A
                                                                                                                  • GetVersionExW.KERNEL32(?), ref: 00403543
                                                                                                                  • GetVersionExW.KERNEL32(0000011C), ref: 0040355A
                                                                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F1
                                                                                                                  • #17.COMCTL32(00000007,00000009,0000000B), ref: 0040362D
                                                                                                                  • OleInitialize.OLE32(00000000), ref: 00403634
                                                                                                                  • SHGetFileInfoW.SHELL32(004216C8,00000000,?,000002B4,00000000), ref: 00403652
                                                                                                                  • GetCommandLineW.KERNEL32(00429220,NSIS Error), ref: 00403667
                                                                                                                  • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000), ref: 004036A0
                                                                                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 004037D3
                                                                                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004037E4
                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004037F0
                                                                                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403804
                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040380C
                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040381D
                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403825
                                                                                                                  • DeleteFileW.KERNELBASE(1033), ref: 00403839
                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403920
                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 0040392F
                                                                                                                    • Part of subcall function 00405AB5: CreateDirectoryW.KERNELBASE(?,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405ABB
                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040393A
                                                                                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\RarSFX0,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,?), ref: 00403946
                                                                                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403966
                                                                                                                  • DeleteFileW.KERNEL32(00420EC8,00420EC8,?,0042B000,?), ref: 004039C5
                                                                                                                  • CopyFileW.KERNEL32(00438800,00420EC8,00000001), ref: 004039D8
                                                                                                                  • CloseHandle.KERNEL32(00000000,00420EC8,00420EC8,?,00420EC8,00000000), ref: 00403A05
                                                                                                                  • ExitProcess.KERNEL32(?), ref: 00403A23
                                                                                                                  • OleUninitialize.OLE32(?), ref: 00403A28
                                                                                                                  • ExitProcess.KERNEL32 ref: 00403A42
                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A56
                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403A5D
                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A71
                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AB5
                                                                                                                  • ExitProcess.KERNEL32 ref: 00403AD6
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                                                                  • String ID: .tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\RarSFX0$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                                  • API String ID: 2292928366-1606162589
                                                                                                                  • Opcode ID: 6a201c649498f46d561448cca06b00f6a05d6c8263ed9975ecbcae0aa3d607cd
                                                                                                                  • Instruction ID: 4ac2e024d61b6b1728d26ff681f76297cbcac85f62426f0f8165ebe0db49c467
                                                                                                                  • Opcode Fuzzy Hash: 6a201c649498f46d561448cca06b00f6a05d6c8263ed9975ecbcae0aa3d607cd
                                                                                                                  • Instruction Fuzzy Hash: 79E10770A00214ABDB20AFB59D45BAF3AB8EB04709F50847FF441B62D1DB7D8A41CB6D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 141 4056a8-4056c3 142 405852-405859 141->142 143 4056c9-405790 GetDlgItem * 3 call 404498 call 404df1 GetClientRect GetSystemMetrics SendMessageW * 2 141->143 145 405883-405890 142->145 146 40585b-40587d GetDlgItem CreateThread FindCloseChangeNotification 142->146 165 405792-4057ac SendMessageW * 2 143->165 166 4057ae-4057b1 143->166 148 405892-405898 145->148 149 4058ae-4058b8 145->149 146->145 151 4058d3-4058dc call 4044ca 148->151 152 40589a-4058a9 ShowWindow * 2 call 404498 148->152 153 4058ba-4058c0 149->153 154 40590e-405912 149->154 162 4058e1-4058e5 151->162 152->149 159 4058c2-4058ce call 40443c 153->159 160 4058e8-4058f8 ShowWindow 153->160 154->151 157 405914-40591a 154->157 157->151 167 40591c-40592f SendMessageW 157->167 159->151 163 405908-405909 call 40443c 160->163 164 4058fa-405903 call 405569 160->164 163->154 164->163 165->166 170 4057c1-4057d8 call 404463 166->170 171 4057b3-4057bf SendMessageW 166->171 172 405a31-405a33 167->172 173 405935-405960 CreatePopupMenu call 406544 AppendMenuW 167->173 178 4057da-4057ee ShowWindow 170->178 179 40580e-40582f GetDlgItem SendMessageW 170->179 171->170 172->162 180 405962-405972 GetWindowRect 173->180 181 405975-40598a TrackPopupMenu 173->181 182 4057f0-4057fb ShowWindow 178->182 183 4057fd 178->183 179->172 185 405835-40584d SendMessageW * 2 179->185 180->181 181->172 184 405990-4059a7 181->184 186 405803-405809 call 404498 182->186 183->186 187 4059ac-4059c7 SendMessageW 184->187 185->172 186->179 187->187 188 4059c9-4059ec OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 187->188 190 4059ee-405a15 SendMessageW 188->190 190->190 191 405a17-405a2b GlobalUnlock SetClipboardData CloseClipboard 190->191 191->172
                                                                                                                  APIs
                                                                                                                  • GetDlgItem.USER32(?,00000403), ref: 00405706
                                                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405715
                                                                                                                  • GetClientRect.USER32(?,?), ref: 00405752
                                                                                                                  • GetSystemMetrics.USER32(00000002), ref: 00405759
                                                                                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040577A
                                                                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040578B
                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040579E
                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057AC
                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057BF
                                                                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004057E1
                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 004057F5
                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405816
                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405826
                                                                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040583F
                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040584B
                                                                                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405724
                                                                                                                    • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405868
                                                                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000563C,00000000), ref: 00405876
                                                                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040587D
                                                                                                                  • ShowWindow.USER32(00000000), ref: 004058A1
                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 004058A6
                                                                                                                  • ShowWindow.USER32(00000008), ref: 004058F0
                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405924
                                                                                                                  • CreatePopupMenu.USER32 ref: 00405935
                                                                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405949
                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00405969
                                                                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405982
                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059BA
                                                                                                                  • OpenClipboard.USER32(00000000), ref: 004059CA
                                                                                                                  • EmptyClipboard.USER32 ref: 004059D0
                                                                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004059DC
                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 004059E6
                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059FA
                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405A1A
                                                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405A25
                                                                                                                  • CloseClipboard.USER32 ref: 00405A2B
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                                                                                  • String ID: {
                                                                                                                  • API String ID: 4154960007-366298937
                                                                                                                  • Opcode ID: b1b6d11e03e474fe05ed43e1ab8ee8a1b6ba8e9c1710d92ba4998ff04e9fb9cd
                                                                                                                  • Instruction ID: 5b575598c53da42792c2c30fd658baa27f5e0e9a45260ba980af1f6e758e053f
                                                                                                                  • Opcode Fuzzy Hash: b1b6d11e03e474fe05ed43e1ab8ee8a1b6ba8e9c1710d92ba4998ff04e9fb9cd
                                                                                                                  • Instruction Fuzzy Hash: 6EB16AB1900609FFEB11AF90DD89AAE7B79FB04354F10803AFA45B61A0CB754E51DF68
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 684 406bfe-406c03 685 406c74-406c92 684->685 686 406c05-406c34 684->686 689 40726a-40727f 685->689 687 406c36-406c39 686->687 688 406c3b-406c3f 686->688 690 406c4b-406c4e 687->690 691 406c41-406c45 688->691 692 406c47 688->692 693 407281-407297 689->693 694 407299-4072af 689->694 695 406c50-406c59 690->695 696 406c6c-406c6f 690->696 691->690 692->690 697 4072b2-4072b9 693->697 694->697 700 406c5b 695->700 701 406c5e-406c6a 695->701 702 406e41-406e5f 696->702 698 4072e0-4072ec 697->698 699 4072bb-4072bf 697->699 712 406a82-406a8b 698->712 703 4072c5-4072dd 699->703 704 40746e-407478 699->704 700->701 708 406cd4-406d02 701->708 706 406e61-406e75 702->706 707 406e77-406e89 702->707 703->698 711 407484-407497 704->711 713 406e8c-406e96 706->713 707->713 709 406d04-406d1c 708->709 710 406d1e-406d38 708->710 714 406d3b-406d45 709->714 710->714 715 40749c-4074a0 711->715 718 406a91 712->718 719 407499 712->719 716 406e98 713->716 717 406e39-406e3f 713->717 721 406d4b 714->721 722 406cbc-406cc2 714->722 723 406e14-406e18 716->723 724 406fa9-406fb6 716->724 717->702 720 406ddd-406de7 717->720 725 406a98-406a9c 718->725 726 406bd8-406bf9 718->726 727 406b3d-406b41 718->727 728 406bad-406bb1 718->728 719->715 736 40742c-407436 720->736 737 406ded-406e0f 720->737 746 406ca1-406cb9 721->746 747 407408-407412 721->747 738 406d75-406d7b 722->738 739 406cc8-406cce 722->739 729 407420-40742a 723->729 730 406e1e-406e36 723->730 724->712 725->711 740 406aa2-406aaf 725->740 726->689 734 406b47-406b60 727->734 735 4073ed-4073f7 727->735 731 406bb7-406bcb 728->731 732 4073fc-407406 728->732 729->711 730->717 743 406bce-406bd6 731->743 732->711 745 406b63-406b67 734->745 735->711 736->711 737->724 741 406dd9 738->741 744 406d7d-406d9b 738->744 739->708 739->741 740->719 742 406ab5-406afb 740->742 741->720 748 406b23-406b25 742->748 749 406afd-406b01 742->749 743->726 743->728 750 406db3-406dc5 744->750 751 406d9d-406db1 744->751 745->727 752 406b69-406b6f 745->752 746->722 747->711 755 406b33-406b3b 748->755 756 406b27-406b31 748->756 753 406b03-406b06 GlobalFree 749->753 754 406b0c-406b1a GlobalAlloc 749->754 757 406dc8-406dd2 750->757 751->757 758 406b71-406b78 752->758 759 406b99-406bab 752->759 753->754 754->719 760 406b20 754->760 755->745 756->755 756->756 757->738 761 406dd4 757->761 762 406b83-406b93 GlobalAlloc 758->762 763 406b7a-406b7d GlobalFree 758->763 759->743 760->748 765 407414-40741e 761->765 766 406d5a-406d72 761->766 762->719 762->759 763->762 765->711 766->738
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                                                                                                                  • Instruction ID: 53db679fe0595a89c24929100efc96b5d5a2697a31689bd0580b70dbb8294089
                                                                                                                  • Opcode Fuzzy Hash: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                                                                                                                  • Instruction Fuzzy Hash: 55F17770D04269CBDF18CFA8C8946ADBBB0FF44305F25816ED856BB281D7786A86CF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 804 40683d-406851 FindFirstFileW 805 406853-40685c FindClose 804->805 806 40685e 804->806 807 406860-406861 805->807 806->807
                                                                                                                  APIs
                                                                                                                  • FindFirstFileW.KERNELBASE(74DF3420,00426758,00425F10,00405F27,00425F10,00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406848
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00406854
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                  • String ID: XgB
                                                                                                                  • API String ID: 2295610775-796949446
                                                                                                                  • Opcode ID: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                                                                                                                  • Instruction ID: 6b6802a92a84c0d1895eb5c997cd82d97c30a63e480feb254935e86212d72bfe
                                                                                                                  • Opcode Fuzzy Hash: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                                                                                                                  • Instruction Fuzzy Hash: 4AD0C9325051205BC2402638AF0C84B6B9A9F563313228A36B5A6E11A0C6348C3286AC
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 192 403f64-403f76 193 403f7c-403f82 192->193 194 4040dd-4040ec 192->194 193->194 195 403f88-403f91 193->195 196 40413b-404150 194->196 197 4040ee-404136 GetDlgItem * 2 call 404463 SetClassLongW call 40140b 194->197 198 403f93-403fa0 SetWindowPos 195->198 199 403fa6-403fad 195->199 201 404190-404195 call 4044af 196->201 202 404152-404155 196->202 197->196 198->199 204 403ff1-403ff7 199->204 205 403faf-403fc9 ShowWindow 199->205 210 40419a-4041b5 201->210 207 404157-404162 call 401389 202->207 208 404188-40418a 202->208 213 404010-404013 204->213 214 403ff9-40400b DestroyWindow 204->214 211 4040ca-4040d8 call 4044ca 205->211 212 403fcf-403fe2 GetWindowLongW 205->212 207->208 227 404164-404183 SendMessageW 207->227 208->201 209 404430 208->209 222 404432-404439 209->222 219 4041b7-4041b9 call 40140b 210->219 220 4041be-4041c4 210->220 211->222 212->211 221 403fe8-403feb ShowWindow 212->221 225 404015-404021 SetWindowLongW 213->225 226 404026-40402c 213->226 223 40440d-404413 214->223 219->220 231 4041ca-4041d5 220->231 232 4043ee-404407 DestroyWindow KiUserCallbackDispatcher 220->232 221->204 223->209 230 404415-40441b 223->230 225->222 226->211 233 404032-404041 GetDlgItem 226->233 227->222 230->209 234 40441d-404426 ShowWindow 230->234 231->232 235 4041db-404228 call 406544 call 404463 * 3 GetDlgItem 231->235 232->223 236 404060-404063 233->236 237 404043-40405a SendMessageW IsWindowEnabled 233->237 234->209 264 404232-40426e ShowWindow KiUserCallbackDispatcher call 404485 EnableWindow 235->264 265 40422a-40422f 235->265 238 404065-404066 236->238 239 404068-40406b 236->239 237->209 237->236 241 404096-40409b call 40443c 238->241 242 404079-40407e 239->242 243 40406d-404073 239->243 241->211 245 4040b4-4040c4 SendMessageW 242->245 247 404080-404086 242->247 243->245 246 404075-404077 243->246 245->211 246->241 250 404088-40408e call 40140b 247->250 251 40409d-4040a6 call 40140b 247->251 262 404094 250->262 251->211 260 4040a8-4040b2 251->260 260->262 262->241 268 404270-404271 264->268 269 404273 264->269 265->264 270 404275-4042a3 GetSystemMenu EnableMenuItem SendMessageW 268->270 269->270 271 4042a5-4042b6 SendMessageW 270->271 272 4042b8 270->272 273 4042be-4042fd call 404498 call 403f45 call 406507 lstrlenW call 406544 SetWindowTextW call 401389 271->273 272->273 273->210 284 404303-404305 273->284 284->210 285 40430b-40430f 284->285 286 404311-404317 285->286 287 40432e-404342 DestroyWindow 285->287 286->209 288 40431d-404323 286->288 287->223 289 404348-404375 CreateDialogParamW 287->289 288->210 290 404329 288->290 289->223 291 40437b-4043d2 call 404463 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 289->291 290->209 291->209 296 4043d4-4043e7 ShowWindow call 4044af 291->296 298 4043ec 296->298 298->223
                                                                                                                  APIs
                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FA0
                                                                                                                  • ShowWindow.USER32(?), ref: 00403FC0
                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00403FD2
                                                                                                                  • ShowWindow.USER32(?,00000004), ref: 00403FEB
                                                                                                                  • DestroyWindow.USER32 ref: 00403FFF
                                                                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404018
                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00404037
                                                                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040404B
                                                                                                                  • IsWindowEnabled.USER32(00000000), ref: 00404052
                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 004040FD
                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00404107
                                                                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00404121
                                                                                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404172
                                                                                                                  • GetDlgItem.USER32(?,00000003), ref: 00404218
                                                                                                                  • ShowWindow.USER32(00000000,?), ref: 00404239
                                                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040424B
                                                                                                                  • EnableWindow.USER32(?,?), ref: 00404266
                                                                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040427C
                                                                                                                  • EnableMenuItem.USER32(00000000), ref: 00404283
                                                                                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040429B
                                                                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042AE
                                                                                                                  • lstrlenW.KERNEL32(00423708,?,00423708,00000000), ref: 004042D8
                                                                                                                  • SetWindowTextW.USER32(?,00423708), ref: 004042EC
                                                                                                                  • ShowWindow.USER32(?,0000000A), ref: 00404420
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 121052019-0
                                                                                                                  • Opcode ID: 66e8e1124669f3008a4bd8227f077bc543d240224f138d8a0267bdb9be33da1e
                                                                                                                  • Instruction ID: 63d0405a778065079f0a8243b170f3468528db945c37da0c1c9e117f306831cd
                                                                                                                  • Opcode Fuzzy Hash: 66e8e1124669f3008a4bd8227f077bc543d240224f138d8a0267bdb9be33da1e
                                                                                                                  • Instruction Fuzzy Hash: 30C1D2B1600205EBDB306F61ED89E3A3A68EB94709F51053EF791B11F0CB795852DB2E
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 299 403bb6-403bce call 4068d4 302 403bd0-403bdb GetUserDefaultUILanguage call 40644e 299->302 303 403be2-403c19 call 4063d5 299->303 306 403be0 302->306 309 403c31-403c37 lstrcatW 303->309 310 403c1b-403c2c call 4063d5 303->310 308 403c3c-403c65 call 403e8c call 405ede 306->308 316 403cf7-403cff call 405ede 308->316 317 403c6b-403c70 308->317 309->308 310->309 322 403d01-403d08 call 406544 316->322 323 403d0d-403d32 LoadImageW 316->323 317->316 318 403c76-403c9e call 4063d5 317->318 318->316 325 403ca0-403ca4 318->325 322->323 327 403db3-403dbb call 40140b 323->327 328 403d34-403d64 RegisterClassW 323->328 329 403cb6-403cc2 lstrlenW 325->329 330 403ca6-403cb3 call 405e03 325->330 341 403dc5-403dd0 call 403e8c 327->341 342 403dbd-403dc0 327->342 331 403e82 328->331 332 403d6a-403dae SystemParametersInfoW CreateWindowExW 328->332 336 403cc4-403cd2 lstrcmpiW 329->336 337 403cea-403cf2 call 405dd6 call 406507 329->337 330->329 335 403e84-403e8b 331->335 332->327 336->337 340 403cd4-403cde GetFileAttributesW 336->340 337->316 344 403ce0-403ce2 340->344 345 403ce4-403ce5 call 405e22 340->345 351 403dd6-403df0 ShowWindow call 406864 341->351 352 403e59-403e5a call 40563c 341->352 342->335 344->337 344->345 345->337 357 403df2-403df7 call 406864 351->357 358 403dfc-403e0e GetClassInfoW 351->358 355 403e5f-403e61 352->355 359 403e63-403e69 355->359 360 403e7b-403e7d call 40140b 355->360 357->358 363 403e10-403e20 GetClassInfoW RegisterClassW 358->363 364 403e26-403e49 DialogBoxParamW call 40140b 358->364 359->342 365 403e6f-403e76 call 40140b 359->365 360->331 363->364 368 403e4e-403e57 call 403b06 364->368 365->342 368->335
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 004068D4: GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                                                                                                                    • Part of subcall function 004068D4: GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                                                                                                                  • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403BD0
                                                                                                                    • Part of subcall function 0040644E: wsprintfW.USER32 ref: 0040645B
                                                                                                                  • lstrcatW.KERNEL32(1033,00423708), ref: 00403C37
                                                                                                                  • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,00435800,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,74DF3420), ref: 00403CB7
                                                                                                                  • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,00435800,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000), ref: 00403CCA
                                                                                                                  • GetFileAttributesW.KERNEL32(: Completed,?,00000000,?), ref: 00403CD5
                                                                                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403D1E
                                                                                                                  • RegisterClassW.USER32(004291C0), ref: 00403D5B
                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403D73
                                                                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DA8
                                                                                                                  • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403DDE
                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,004291C0), ref: 00403E0A
                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit,004291C0), ref: 00403E17
                                                                                                                  • RegisterClassW.USER32(004291C0), ref: 00403E20
                                                                                                                  • DialogBoxParamW.USER32(?,00000000,00403F64,00000000), ref: 00403E3F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                                                                                  • String ID: .DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                  • API String ID: 606308-572083776
                                                                                                                  • Opcode ID: fb649e24f98e44229479f169acb53c45bca4c534de1dfb1f3cfba33920d5d302
                                                                                                                  • Instruction ID: f8e28dda484975e23f2397f6e39507faffe4a9094113ace64084d81fe028ea3a
                                                                                                                  • Opcode Fuzzy Hash: fb649e24f98e44229479f169acb53c45bca4c534de1dfb1f3cfba33920d5d302
                                                                                                                  • Instruction Fuzzy Hash: B761D570244200BBD720AF66AD45F2B3A6CEB84B49F40453FFD41B62E1DB795912CA7D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 372 40307d-4030cb GetTickCount GetModuleFileNameW call 405ff7 375 4030d7-403105 call 406507 call 405e22 call 406507 GetFileSize 372->375 376 4030cd-4030d2 372->376 384 4031f0-4031fe call 403019 375->384 385 40310b 375->385 377 4032ad-4032b1 376->377 391 403200-403203 384->391 392 403253-403258 384->392 387 403110-403127 385->387 389 403129 387->389 390 40312b-403134 call 403499 387->390 389->390 398 40325a-403262 call 403019 390->398 399 40313a-403141 390->399 394 403205-40321d call 4034af call 403499 391->394 395 403227-403251 GlobalAlloc call 4034af call 4032b4 391->395 392->377 394->392 420 40321f-403225 394->420 395->392 418 403264-403275 395->418 398->392 403 403143-403157 call 405fb2 399->403 404 4031bd-4031c1 399->404 409 4031cb-4031d1 403->409 423 403159-403160 403->423 408 4031c3-4031ca call 403019 404->408 404->409 408->409 415 4031e0-4031e8 409->415 416 4031d3-4031dd call 4069c1 409->416 415->387 419 4031ee 415->419 416->415 425 403277 418->425 426 40327d-403282 418->426 419->384 420->392 420->395 423->409 424 403162-403169 423->424 424->409 428 40316b-403172 424->428 425->426 429 403283-403289 426->429 428->409 430 403174-40317b 428->430 429->429 431 40328b-4032a6 SetFilePointer call 405fb2 429->431 430->409 432 40317d-40319d 430->432 435 4032ab 431->435 432->392 434 4031a3-4031a7 432->434 436 4031a9-4031ad 434->436 437 4031af-4031b7 434->437 435->377 436->419 436->437 437->409 438 4031b9-4031bb 437->438 438->409
                                                                                                                  APIs
                                                                                                                  • GetTickCount.KERNEL32 ref: 0040308E
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400,?,?,?,?,?,00403847,?), ref: 004030AA
                                                                                                                    • Part of subcall function 00405FF7: GetFileAttributesW.KERNELBASE(00000003,004030BD,00438800,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                                                                                                                    • Part of subcall function 00405FF7: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\AppData\Local\Temp\RarSFX0,C:\Users\user\AppData\Local\Temp\RarSFX0,00438800,00438800,80000000,00000003,?,?,?,?,?,00403847), ref: 004030F6
                                                                                                                  • GlobalAlloc.KERNELBASE(00000040,G8@,?,?,?,?,?,00403847,?), ref: 0040322C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\RarSFX0$Error launching installer$G8@$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                  • API String ID: 2803837635-1807476597
                                                                                                                  • Opcode ID: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                                                                                                                  • Instruction ID: 1a01736021049f1647ec9a5272654600d533d4cd09788acd7f842f4bfc25432a
                                                                                                                  • Opcode Fuzzy Hash: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                                                                                                                  • Instruction Fuzzy Hash: 06518371901205AFDB209F65DD82B9E7EACEB09756F10807BF901B62D1C77C8F418A6D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 439 406544-40654f 440 406551-406560 439->440 441 406562-406578 439->441 440->441 442 406590-406599 441->442 443 40657a-406587 441->443 445 406774-40677f 442->445 446 40659f 442->446 443->442 444 406589-40658c 443->444 444->442 448 406781-406785 call 406507 445->448 449 40678a-40678b 445->449 447 4065a4-4065b1 446->447 447->445 450 4065b7-4065c0 447->450 448->449 452 406752 450->452 453 4065c6-406603 450->453 454 406760-406763 452->454 455 406754-40675e 452->455 456 4066f6-4066fb 453->456 457 406609-406610 453->457 458 406765-40676e 454->458 455->458 459 4066fd-406703 456->459 460 40672e-406733 456->460 461 406612-406614 457->461 462 406615-406617 457->462 458->445 463 4065a1 458->463 464 406713-40671f call 406507 459->464 465 406705-406711 call 40644e 459->465 468 406742-406750 lstrlenW 460->468 469 406735-40673d call 406544 460->469 461->462 466 406654-406657 462->466 467 406619-406640 call 4063d5 462->467 463->447 480 406724-40672a 464->480 465->480 470 406667-40666a 466->470 471 406659-406665 GetSystemDirectoryW 466->471 484 4066dd-4066e1 467->484 486 406646-40664f call 406544 467->486 468->458 469->468 477 4066d3-4066d5 470->477 478 40666c-40667a GetWindowsDirectoryW 470->478 476 4066d7-4066db 471->476 476->484 485 4066ee-4066f4 call 40678e 476->485 477->476 483 40667c-406684 477->483 478->477 480->468 482 40672c 480->482 482->485 490 406686-40668f 483->490 491 40669b-4066b1 SHGetSpecialFolderLocation 483->491 484->485 487 4066e3-4066e9 lstrcatW 484->487 485->468 486->476 487->485 496 406697-406699 490->496 494 4066b3-4066cd SHGetPathFromIDListW CoTaskMemFree 491->494 495 4066cf 491->495 494->476 494->495 495->477 496->476 496->491
                                                                                                                  APIs
                                                                                                                  • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 0040665F
                                                                                                                  • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,004226E8,?,004055A0,004226E8,00000000,00000000,00418EC0,00000000), ref: 00406672
                                                                                                                  • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                                                                                                                  • lstrlenW.KERNEL32(: Completed,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                                                                  • String ID: : Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                  • API String ID: 4260037668-2549942501
                                                                                                                  • Opcode ID: 4f256cf52d51bc45a82507bfe95e0a7ec11cb3c5eab23a7c9971658e825af729
                                                                                                                  • Instruction ID: a0e829acba6452fa9eccf544198c9fcc7de98ae724d9d0e98a153b46e40356ac
                                                                                                                  • Opcode Fuzzy Hash: 4f256cf52d51bc45a82507bfe95e0a7ec11cb3c5eab23a7c9971658e825af729
                                                                                                                  • Instruction Fuzzy Hash: 5261E371A00215ABDB209F64DC40AAE37A5EF44318F11813AE957B72D0D77E8AA1CB5D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 497 40176f-401794 call 402da6 call 405e4d 502 401796-40179c call 406507 497->502 503 40179e-4017b0 call 406507 call 405dd6 lstrcatW 497->503 508 4017b5-4017b6 call 40678e 502->508 503->508 512 4017bb-4017bf 508->512 513 4017c1-4017cb call 40683d 512->513 514 4017f2-4017f5 512->514 521 4017dd-4017ef 513->521 522 4017cd-4017db CompareFileTime 513->522 515 4017f7-4017f8 call 405fd2 514->515 516 4017fd-401819 call 405ff7 514->516 515->516 524 40181b-40181e 516->524 525 40188d-4018b6 call 405569 call 4032b4 516->525 521->514 522->521 526 401820-40185e call 406507 * 2 call 406544 call 406507 call 405b67 524->526 527 40186f-401879 call 405569 524->527 537 4018b8-4018bc 525->537 538 4018be-4018ca SetFileTime 525->538 526->512 559 401864-401865 526->559 539 401882-401888 527->539 537->538 541 4018d0-4018db FindCloseChangeNotification 537->541 538->541 542 402c33 539->542 544 4018e1-4018e4 541->544 545 402c2a-402c2d 541->545 546 402c35-402c39 542->546 549 4018e6-4018f7 call 406544 lstrcatW 544->549 550 4018f9-4018fc call 406544 544->550 545->542 556 401901-4023a2 call 405b67 549->556 550->556 556->545 556->546 559->539 561 401867-401868 559->561 561->527
                                                                                                                  APIs
                                                                                                                  • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                                                                                                                  • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache,?,?,00000031), ref: 004017D5
                                                                                                                    • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                                                                                                                    • Part of subcall function 00405569: lstrlenW.KERNEL32(004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                                                                                                                    • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                                                                                                                    • Part of subcall function 00405569: lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                                                                                                                    • Part of subcall function 00405569: SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                                                                                                                    • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                                                                                                                    • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                                                                                                                    • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache$open$open cmd
                                                                                                                  • API String ID: 1941528284-1391832873
                                                                                                                  • Opcode ID: cff18b76cdb8d76bbb3d49e6b079a2043f43baf22f2567b8a93e71465b720055
                                                                                                                  • Instruction ID: a51aac5e68297d7f44276dbadf5c543e50a4c9306f3e74aef663979029aae524
                                                                                                                  • Opcode Fuzzy Hash: cff18b76cdb8d76bbb3d49e6b079a2043f43baf22f2567b8a93e71465b720055
                                                                                                                  • Instruction Fuzzy Hash: AA41A071900105BACF11BBA5DD85DAE3AB9EF45328F20423FF412B10E1D63C8A519A6E
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 563 405569-40557e 564 405584-405595 563->564 565 405635-405639 563->565 566 4055a0-4055ac lstrlenW 564->566 567 405597-40559b call 406544 564->567 569 4055c9-4055cd 566->569 570 4055ae-4055be lstrlenW 566->570 567->566 572 4055dc-4055e0 569->572 573 4055cf-4055d6 SetWindowTextW 569->573 570->565 571 4055c0-4055c4 lstrcatW 570->571 571->569 574 4055e2-405624 SendMessageW * 3 572->574 575 405626-405628 572->575 573->572 574->575 575->565 576 40562a-40562d 575->576 576->565
                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                                                                                                                  • lstrlenW.KERNEL32(004033ED,004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                                                                                                                  • lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                                                                                                                  • SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                                                                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                                                                                                                    • Part of subcall function 00406544: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                                                                                                                    • Part of subcall function 00406544: lstrlenW.KERNEL32(: Completed,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                                                                  • String ID: &B
                                                                                                                  • API String ID: 1495540970-3208460036
                                                                                                                  • Opcode ID: c9e82e23593916cc8667a553ec3376e3b2091dc3bfbd8f68e29cf771addae687
                                                                                                                  • Instruction ID: ee6600945c56622aa7300660faa8e28c1de3552a97c3cc7a142cd67d2e53ceba
                                                                                                                  • Opcode Fuzzy Hash: c9e82e23593916cc8667a553ec3376e3b2091dc3bfbd8f68e29cf771addae687
                                                                                                                  • Instruction Fuzzy Hash: 7021AC71900518BACF219F96DD84ACFBFB9EF45354F50807AF904B62A0C7798A51CFA8
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 577 4032b4-4032cb 578 4032d4-4032dc 577->578 579 4032cd 577->579 580 4032e3-4032e8 578->580 581 4032de 578->581 579->578 582 4032f8-403305 call 403499 580->582 583 4032ea-4032f3 call 4034af 580->583 581->580 587 403450 582->587 588 40330b-40330f 582->588 583->582 591 403452-403453 587->591 589 403315-403335 GetTickCount call 406a2f 588->589 590 403439-40343b 588->590 601 40348f 589->601 603 40333b-403343 589->603 592 403484-403488 590->592 593 40343d-403440 590->593 595 403492-403496 591->595 596 403455-40345b 592->596 597 40348a 592->597 598 403442 593->598 599 403445-40344e call 403499 593->599 604 403460-40346e call 403499 596->604 605 40345d 596->605 597->601 598->599 599->587 610 40348c 599->610 601->595 607 403345 603->607 608 403348-403356 call 403499 603->608 604->587 614 403470-40347c call 4060a9 604->614 605->604 607->608 608->587 615 40335c-403365 608->615 610->601 619 403435-403437 614->619 620 40347e-403481 614->620 618 40336b-403388 call 406a4f 615->618 623 403431-403433 618->623 624 40338e-4033a5 GetTickCount 618->624 619->591 620->592 623->591 625 4033f0-4033f2 624->625 626 4033a7-4033af 624->626 629 4033f4-4033f8 625->629 630 403425-403429 625->630 627 4033b1-4033b5 626->627 628 4033b7-4033e8 MulDiv wsprintfW call 405569 626->628 627->625 627->628 635 4033ed 628->635 632 4033fa-4033ff call 4060a9 629->632 633 40340d-403413 629->633 630->603 634 40342f 630->634 638 403404-403406 632->638 637 403419-40341d 633->637 634->601 635->625 637->618 639 403423 637->639 638->619 640 403408-40340b 638->640 639->601 640->637
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CountTick$wsprintf
                                                                                                                  • String ID: ... %d%%$G8@
                                                                                                                  • API String ID: 551687249-649311722
                                                                                                                  • Opcode ID: 0ab2bdc8f4aac4b64a671381cd6011d12ac280905d32863242ebb6a28b8b2df1
                                                                                                                  • Instruction ID: 27b76012fb03590ae9ad79c5aacab076c27bed8bf8d9d3eaec1048eb1f993e7f
                                                                                                                  • Opcode Fuzzy Hash: 0ab2bdc8f4aac4b64a671381cd6011d12ac280905d32863242ebb6a28b8b2df1
                                                                                                                  • Instruction Fuzzy Hash: 7F519D71900219DBCB11DF65DA446AF7FA8AB40766F14417FFD00BB2C1D7788E408BA9
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 641 406864-406884 GetSystemDirectoryW 642 406886 641->642 643 406888-40688a 641->643 642->643 644 40689b-40689d 643->644 645 40688c-406895 643->645 646 40689e-4068d1 wsprintfW LoadLibraryExW 644->646 645->644 647 406897-406899 645->647 647->646
                                                                                                                  APIs
                                                                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                                                                                                                  • wsprintfW.USER32 ref: 004068B6
                                                                                                                  • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068CA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                  • String ID: %s%S.dll$UXTHEME$\
                                                                                                                  • API String ID: 2200240437-1946221925
                                                                                                                  • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                                                                  • Instruction ID: a3f2ba33ef282063e8bef789480649f163c4345fe71bbebd74fcccbb96bf8ece
                                                                                                                  • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                                                                  • Instruction Fuzzy Hash: 8DF0F671511119ABCB14BF64ED0DF9B376CAB00305F51447AAA46F10D0EB7CAA69CBA8
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 648 406026-406032 649 406033-406067 GetTickCount GetTempFileNameW 648->649 650 406076-406078 649->650 651 406069-40606b 649->651 652 406070-406073 650->652 651->649 653 40606d 651->653 653->652
                                                                                                                  APIs
                                                                                                                  • GetTickCount.KERNEL32 ref: 00406044
                                                                                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,004034F5,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 0040605F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CountFileNameTempTick
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                  • API String ID: 1716503409-678247507
                                                                                                                  • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                                                                  • Instruction ID: f6a7e3e28ef10c8b5a356f390c602f787c019cac788ca5903e6ee53affe9a5d3
                                                                                                                  • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                                                                  • Instruction Fuzzy Hash: 92F09076B40204BBEB00CF59ED05E9EB7BCEB95750F11803AEA05F7140E6B09D648768
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 654 401b9b-401ba6 655 401ba8-401bab 654->655 656 401bec-401bef 654->656 659 401bb1-401bb5 655->659 660 40238a-4023a2 call 406544 call 405b67 655->660 657 401bf1-401bf3 656->657 658 401c16-401c2c GlobalAlloc call 406544 656->658 661 401bf9-401c11 call 406507 GlobalFree 657->661 662 40292e-402935 657->662 667 401c31-401c3e 658->667 659->655 665 401bb7-401bb9 659->665 670 402c2a-402c33 660->670 675 402c35-402c39 660->675 661->670 662->670 665->660 669 401bbf-402a99 call 406507 * 3 665->669 667->660 667->670 669->670 670->675
                                                                                                                  APIs
                                                                                                                  • GlobalFree.KERNELBASE(007862E0), ref: 00401C0B
                                                                                                                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                                                                                                                    • Part of subcall function 00406544: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                                                                                                                    • Part of subcall function 00406544: lstrlenW.KERNEL32(: Completed,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Global$AllocFreelstrcatlstrlen
                                                                                                                  • String ID: open$bx
                                                                                                                  • API String ID: 3292104215-3346839987
                                                                                                                  • Opcode ID: 416e0808797b3da9c1fece3e967c8094de08963848feecb337ecbf82cdc503c9
                                                                                                                  • Instruction ID: e925a152a6e0f7021576dd296752ea90fe74f89098b2d6bde03e837448aacd47
                                                                                                                  • Opcode Fuzzy Hash: 416e0808797b3da9c1fece3e967c8094de08963848feecb337ecbf82cdc503c9
                                                                                                                  • Instruction Fuzzy Hash: BA213673904210EBD720AFA4DEC5E5E72A4EB08328715093BF552B72D1D6BCE8518B5D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 767 4015c1-4015d5 call 402da6 call 405e81 772 401631-401634 767->772 773 4015d7-4015ea call 405e03 767->773 775 401663-4022f6 call 401423 772->775 776 401636-401655 call 401423 call 406507 SetCurrentDirectoryW 772->776 781 401604-401607 call 405ab5 773->781 782 4015ec-4015ef 773->782 791 402c2a-402c39 775->791 792 40292e-402935 775->792 776->791 794 40165b-40165e 776->794 790 40160c-40160e 781->790 782->781 787 4015f1-4015f8 call 405ad2 782->787 787->781 798 4015fa-401602 call 405a38 787->798 796 401610-401615 790->796 797 401627-40162f 790->797 792->791 794->791 800 401624 796->800 801 401617-401622 GetFileAttributesW 796->801 797->772 797->773 798->790 800->797 801->797 801->800
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00405E81: CharNextW.USER32(?,?,00425F10,?,00405EF5,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E8F
                                                                                                                    • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405E94
                                                                                                                    • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405EAC
                                                                                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                                    • Part of subcall function 00405A38: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A7B
                                                                                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache,?,00000000,000000F0), ref: 0040164D
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00401640
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                                                                                  • API String ID: 1892508949-455884830
                                                                                                                  • Opcode ID: f05bda5ccba1a2e5aa416980a25588bb69072d489e09a94885b650edebede0fb
                                                                                                                  • Instruction ID: 5432bfb841e0ad51ec8b230ce72dc3ef5087fba7ddd62730da8486a2a7133ac3
                                                                                                                  • Opcode Fuzzy Hash: f05bda5ccba1a2e5aa416980a25588bb69072d489e09a94885b650edebede0fb
                                                                                                                  • Instruction Fuzzy Hash: 0F110331504100EBCF216FA0CD40A9F36A0EF14328B24093BF941B12F1DA3E4A829B8D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                                                                                                                  • Instruction ID: a7cd93b13192ddc82b920214167f5e61206f8c8658b3f9d41a1d2146159b2bab
                                                                                                                  • Opcode Fuzzy Hash: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                                                                                                                  • Instruction Fuzzy Hash: 7DA15571E04229CBDB28CFA8C8446ADBBB1FF44305F14816ED856BB281C7786A86DF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                                                                                                                  • Instruction ID: 8a2c3c043c9bb5ba2b5721dff60c2e2798a6d81db984abdc297d3eb4e69e55d3
                                                                                                                  • Opcode Fuzzy Hash: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                                                                                                                  • Instruction Fuzzy Hash: 11911170D04229CBEF28CF98C8947ADBBB1FB44305F14816ED856BB291C7786A86DF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                                                                                                                  • Instruction ID: 00773887ea3243dfb52df8404d42644f62a25abb174058b9e5a1e26f950428c6
                                                                                                                  • Opcode Fuzzy Hash: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                                                                                                                  • Instruction Fuzzy Hash: 27813671D04229CFDF24CFA8C8847ADBBB1FB44305F24816AD856BB281C7786A86DF55
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                                                                                                                  • Instruction ID: 0eb50412ba17cbd686f9e43e0b7d85c943a315db4d9133bb66c32ce13943f697
                                                                                                                  • Opcode Fuzzy Hash: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                                                                                                                  • Instruction Fuzzy Hash: E7813471E04229DBDF24CFA9C8447ADBBB0FB44305F24816ED856BB281C7786A86DF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                                                                                                                  • Instruction ID: 6da958b06032b63f13a44664be3ec753dd66a0d9f0ebc92e4dfa00afb32c2233
                                                                                                                  • Opcode Fuzzy Hash: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                                                                                                                  • Instruction Fuzzy Hash: 677123B1D04229CBDF24CFA8C8847ADBBF1FB44305F14816AE856B7281D7386A86DF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                                                                                                                  • Instruction ID: e79abdf9917e1b0942e39fca47e1ede282e873968176da0823b4a4e8bca0445d
                                                                                                                  • Opcode Fuzzy Hash: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                                                                                                                  • Instruction Fuzzy Hash: 0A712371E04229CBDB28CF98C884BADBBB1FB44305F14816EE856B7291C7786986DF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                                                                                                                  • Instruction ID: 82756e30bcf828709d5cbcfbd5bc5585b8b9ec353a8eaca6552b8bf5b5cc12a5
                                                                                                                  • Opcode Fuzzy Hash: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                                                                                                                  • Instruction Fuzzy Hash: 70713371E04229CBDF28CF98C844BADBBB1FB44305F14816EE856B7291C7786A86DF45
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00405B2D: ShellExecuteExW.SHELL32(?), ref: 00405B3C
                                                                                                                    • Part of subcall function 0040697F: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406990
                                                                                                                    • Part of subcall function 0040697F: GetExitCodeProcess.KERNELBASE(?,?), ref: 004069B2
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00401F6A
                                                                                                                  • @, xrefs: 00401F8A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                                                                  • String ID: @$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                                                                                  • API String ID: 165873841-3372431936
                                                                                                                  • Opcode ID: 1f5917e33a56c947b6e5a947a7c5c6b6bc43c16b3be91fb6cacf00c248c14470
                                                                                                                  • Instruction ID: e5fb9d027c761589e680b1257b4cadef509076267ccb1bc0e8fa647dfd1f3a7d
                                                                                                                  • Opcode Fuzzy Hash: 1f5917e33a56c947b6e5a947a7c5c6b6bc43c16b3be91fb6cacf00c248c14470
                                                                                                                  • Instruction Fuzzy Hash: 9C114971E042189ACB60EFB9CA49B8CB6F4AF08304F20457AE405F72D1EBBC89459B18
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • WaitForSingleObject.KERNEL32(?,00000064), ref: 00406990
                                                                                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 004069A5
                                                                                                                  • GetExitCodeProcess.KERNELBASE(?,?), ref: 004069B2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ObjectSingleWait$CodeExitProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2567322000-0
                                                                                                                  • Opcode ID: b4e22deffd65f84e370c04cbd1d88a1e749a9585608b68ea3518500749b930bb
                                                                                                                  • Instruction ID: 36eed24e95c07865df7b56cd3c3a37613c402ee52c1e894a6bace4c6932a2b17
                                                                                                                  • Opcode Fuzzy Hash: b4e22deffd65f84e370c04cbd1d88a1e749a9585608b68ea3518500749b930bb
                                                                                                                  • Instruction Fuzzy Hash: 25E0D8B1600508FBDF109B55DD06E9E7B6EDB84700F110037F601B61A0C7B6AE61DBA8
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                  • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3850602802-0
                                                                                                                  • Opcode ID: 970bce7bfd6110042ba11e2ba34b1580a3262637bb8a43ad7db674ac8d0d0c57
                                                                                                                  • Instruction ID: 40daf909c284af41af5c9cdf7f458e0296b91398e9c9917f7ae767538e8fd086
                                                                                                                  • Opcode Fuzzy Hash: 970bce7bfd6110042ba11e2ba34b1580a3262637bb8a43ad7db674ac8d0d0c57
                                                                                                                  • Instruction Fuzzy Hash: 1A01D131724220EBEB194B389D09B2A3698E710318F10867AF855F66F1E6788C129B5C
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$EnableShow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1136574915-0
                                                                                                                  • Opcode ID: dc987a2418bededafa9039ccbb786b59f9cf8f416ed8c99e1cda5871faa3231f
                                                                                                                  • Instruction ID: 5d3c5223d4adea09edd48fe2ddafa99b3fbee87e2958761c9001e4fb32d1ad87
                                                                                                                  • Opcode Fuzzy Hash: dc987a2418bededafa9039ccbb786b59f9cf8f416ed8c99e1cda5871faa3231f
                                                                                                                  • Instruction Fuzzy Hash: C3E0D872908201CFE705EBA4EE485AE73F4EF40315710097FE401F11D1DBB54C00866D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                                                                                                                    • Part of subcall function 00406864: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                                                                                                                    • Part of subcall function 00406864: wsprintfW.USER32 ref: 004068B6
                                                                                                                    • Part of subcall function 00406864: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068CA
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2547128583-0
                                                                                                                  • Opcode ID: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                                                                  • Instruction ID: b54d22b37b479e59566a9631c032e51b8c6cd741f5ea0e4d018af200ac078f8b
                                                                                                                  • Opcode Fuzzy Hash: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                                                                  • Instruction Fuzzy Hash: 48E086335042109AE21197715D44C7B73A8AF89650307443EF947F2080DB38DC31A669
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetFileAttributesW.KERNELBASE(00000003,004030BD,00438800,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                                                                                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$AttributesCreate
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 415043291-0
                                                                                                                  • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                                                                  • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                                                                                                  • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                                                                  • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetFileAttributesW.KERNELBASE(?,?,00405BD7,?,?,00000000,00405DAD,?,?,?,?), ref: 00405FD7
                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405FEB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3188754299-0
                                                                                                                  • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                  • Instruction ID: 846b50f6ec280e5947384c74444241e6b9796591039fc91e932c01759f2cc32f
                                                                                                                  • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                                                  • Instruction Fuzzy Hash: 2CD0C972504531ABC2102728EE0889BBB55EF642717054A35FAA5A22B0CB304C529E98
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CreateDirectoryW.KERNELBASE(?,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405ABB
                                                                                                                  • GetLastError.KERNEL32 ref: 00405AC9
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1375471231-0
                                                                                                                  • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                                                                  • Instruction ID: 81e7360d8487983dd45b28c0c59a41c1d83062ba9acea414cf4290cf05fa9266
                                                                                                                  • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                                                                  • Instruction Fuzzy Hash: C3C04C30314601AED7505B609E48B177EA19B94741F1A85396146E41A4DA389455DD2D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034AC,00000000,00000000,00403303,000000FF,00000004,00000000,00000000,00000000), ref: 0040608E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileRead
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2738559852-0
                                                                                                                  • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                  • Instruction ID: c8e4d841af9964a9af1d27d101842a5e1860e0780d1899a5c61b78fe641b59a9
                                                                                                                  • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                                                  • Instruction Fuzzy Hash: 84E08632140219ABCF10EE518C00EEB379CFF01390F054432F911E2140D638E92187A4
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040347A,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060BD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3934441357-0
                                                                                                                  • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                  • Instruction ID: 36c6d552b97af02dd58307b05a598db1695570393df740455f8c701413f3969e
                                                                                                                  • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                                                  • Instruction Fuzzy Hash: AFE0E632150169ABDF10DE559C00EEB775CEB05351F014476F955E3150DA31E87197A5
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044C1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3850602802-0
                                                                                                                  • Opcode ID: 74117c3da1d14bbcbc4f92c0e0eb3ebd0fff66770c46117da5e433d52de2638c
                                                                                                                  • Instruction ID: 22c14ff0de7d99e8655fd7423acc63eaa31bea8074cc9abcc6b2c74ee929f0f7
                                                                                                                  • Opcode Fuzzy Hash: 74117c3da1d14bbcbc4f92c0e0eb3ebd0fff66770c46117da5e433d52de2638c
                                                                                                                  • Instruction Fuzzy Hash: 54C09B71740706BBEE608F519D49F1777586750700F298579B755F60D0C674E410DA1C
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00405B3C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExecuteShell
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 587946157-0
                                                                                                                  • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                                                                                  • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                                                                                                                  • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                                                                                  • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3850602802-0
                                                                                                                  • Opcode ID: 3ca17ea631bf80887aa3d9427a31a3d2622a0e2ccdc50664b5f44c823975825e
                                                                                                                  • Instruction ID: a70792fcf8e9dbddb4bc54a752e2f47ec30058e0f009e109d264f56951a5bac9
                                                                                                                  • Opcode Fuzzy Hash: 3ca17ea631bf80887aa3d9427a31a3d2622a0e2ccdc50664b5f44c823975825e
                                                                                                                  • Instruction Fuzzy Hash: 28B09236281A00EBDE614B00EE09F457A62A768701F008468B641240B0CAB240A5DB19
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,00403847,?), ref: 004034BD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FilePointer
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 973152223-0
                                                                                                                  • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                  • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                                                                  • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                                                  • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • KiUserCallbackDispatcher.NTDLL(?,0040425C), ref: 0040448F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CallbackDispatcherUser
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2492992576-0
                                                                                                                  • Opcode ID: 6342aa29cb2c9815646e1c742645cf47b0e1b8d5e1fd84f5a818bc9ff96277f1
                                                                                                                  • Instruction ID: c8b2e0b7737fb6f3a2012ed53d18a955e8c044ab00f5fdb14f1eccf879f4c073
                                                                                                                  • Opcode Fuzzy Hash: 6342aa29cb2c9815646e1c742645cf47b0e1b8d5e1fd84f5a818bc9ff96277f1
                                                                                                                  • Instruction Fuzzy Hash: 6FA001B6604500ABDE129FA1EF09D0ABF72EBA4702B418579E28590034CB364961EF1D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CloseHandle.KERNEL32(FFFFFFFF,00403A28,?), ref: 00403AE7
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2962429428-0
                                                                                                                  • Opcode ID: f6c28f5574ac8d83da97f56e868f3fb7eedea34588f0df7261564807e3161c24
                                                                                                                  • Instruction ID: d4db8dbaf33ff22f2ff991163c220eb3cd6c997f56162562831ac65c0e81f35c
                                                                                                                  • Opcode Fuzzy Hash: f6c28f5574ac8d83da97f56e868f3fb7eedea34588f0df7261564807e3161c24
                                                                                                                  • Instruction Fuzzy Hash: 15C01230504B0056D574AFB99E4FA053A649B4573DB600729B0F8B40F1CF7C5699995D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetDlgItem.USER32(?,000003FB), ref: 004049A3
                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 004049CD
                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404A7E
                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404A89
                                                                                                                  • lstrcmpiW.KERNEL32(: Completed,00423708,00000000,?,?), ref: 00404ABB
                                                                                                                  • lstrcatW.KERNEL32(?,: Completed), ref: 00404AC7
                                                                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404AD9
                                                                                                                    • Part of subcall function 00405B4B: GetDlgItemTextW.USER32(?,?,00000400,00404B10), ref: 00405B5E
                                                                                                                    • Part of subcall function 0040678E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 004067F1
                                                                                                                    • Part of subcall function 0040678E: CharNextW.USER32(?,?,?,00000000,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406800
                                                                                                                    • Part of subcall function 0040678E: CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406805
                                                                                                                    • Part of subcall function 0040678E: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406818
                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(004216D8,?,?,0000040F,?,004216D8,004216D8,?,00000001,004216D8,?,?,000003FB,?), ref: 00404B9C
                                                                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BB7
                                                                                                                    • Part of subcall function 00404D10: lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                                                                                                                    • Part of subcall function 00404D10: wsprintfW.USER32 ref: 00404DBA
                                                                                                                    • Part of subcall function 00404D10: SetDlgItemTextW.USER32(?,00423708), ref: 00404DCD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                  • String ID: : Completed$A
                                                                                                                  • API String ID: 2624150263-4013017881
                                                                                                                  • Opcode ID: 6bd2bc8b533fb15e6f7c23c87040bd2a6000733d02ac869fbd78df79038ba633
                                                                                                                  • Instruction ID: 7ddb5d330cbe89f2e36b0747fff93e5a2dbc4858b94af439da1a7eccca155f6e
                                                                                                                  • Opcode Fuzzy Hash: 6bd2bc8b533fb15e6f7c23c87040bd2a6000733d02ac869fbd78df79038ba633
                                                                                                                  • Instruction Fuzzy Hash: 2EA18FB1900209ABDB119FA6CD45AAFB6B8EF84314F11803BF611B62D1D77C9A418B69
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • DeleteFileW.KERNEL32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C3C
                                                                                                                  • lstrcatW.KERNEL32(00425710,\*.*), ref: 00405C84
                                                                                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405CA7
                                                                                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00425710,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CAD
                                                                                                                  • FindFirstFileW.KERNEL32(00425710,?,?,?,0040A014,?,00425710,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CBD
                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D5D
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00405D6C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                  • String ID: .$.$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                                  • API String ID: 2035342205-4130279798
                                                                                                                  • Opcode ID: 4b731669e665cacf6ce1f794043a7a558127a79abdb50f6fa8d1a93f69750987
                                                                                                                  • Instruction ID: 7f21bfa76759dd048c017f5e8d67b30635c21f713a141b53f9c1cb2b61cba077
                                                                                                                  • Opcode Fuzzy Hash: 4b731669e665cacf6ce1f794043a7a558127a79abdb50f6fa8d1a93f69750987
                                                                                                                  • Instruction Fuzzy Hash: BD419F30400A15BADB21AB619C8DAAF7B78EF41718F14817BF801721D1D77C4A82DEAE
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00402269
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateInstance
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                                                                                  • API String ID: 542301482-455884830
                                                                                                                  • Opcode ID: b7224711a1886d81de964c301140e5375d6dc29c5df58188df5f48abd80a26da
                                                                                                                  • Instruction ID: 543bd56792285dd9977ebe6a5c934514532920c251de70bc34d4fa366edb348e
                                                                                                                  • Opcode Fuzzy Hash: b7224711a1886d81de964c301140e5375d6dc29c5df58188df5f48abd80a26da
                                                                                                                  • Instruction Fuzzy Hash: 80411771A00209EFCF40DFE4C989E9D7BB5BF49308B20456AF505EB2D1DB799941CB94
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404EE8
                                                                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404EF3
                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F3D
                                                                                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F54
                                                                                                                  • SetWindowLongW.USER32(?,000000FC,004054DD), ref: 00404F6D
                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404F81
                                                                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404F93
                                                                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404FA9
                                                                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FB5
                                                                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FC7
                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00404FCA
                                                                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404FF5
                                                                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405001
                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040509C
                                                                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 004050CC
                                                                                                                    • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050E0
                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0040510E
                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040511C
                                                                                                                  • ShowWindow.USER32(?,00000005), ref: 0040512C
                                                                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405227
                                                                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040528C
                                                                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052A1
                                                                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052C5
                                                                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004052E5
                                                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 004052FA
                                                                                                                  • GlobalFree.KERNEL32(?), ref: 0040530A
                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405383
                                                                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 0040542C
                                                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040543B
                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405466
                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 004054B4
                                                                                                                  • GetDlgItem.USER32(?,000003FE), ref: 004054BF
                                                                                                                  • ShowWindow.USER32(00000000), ref: 004054C6
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                  • String ID: $M$N
                                                                                                                  • API String ID: 2564846305-813528018
                                                                                                                  • Opcode ID: fcc7e91b83617d145af11aec22520696422ccde9284fa118c4a43dbc05db5981
                                                                                                                  • Instruction ID: f25f8d73efcf6ba6a17deb726488d783a00b9a1a7703c2d4830b1b44d3514242
                                                                                                                  • Opcode Fuzzy Hash: fcc7e91b83617d145af11aec22520696422ccde9284fa118c4a43dbc05db5981
                                                                                                                  • Instruction Fuzzy Hash: 34027D70A00609EFDB20DF95CC45AAF7BB5FB84315F10817AE910BA2E1D7798A52CF58
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046C0
                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 004046D4
                                                                                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004046F1
                                                                                                                  • GetSysColor.USER32(?), ref: 00404702
                                                                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404710
                                                                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040471E
                                                                                                                  • lstrlenW.KERNEL32(?), ref: 00404723
                                                                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404730
                                                                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404745
                                                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040479E
                                                                                                                  • SendMessageW.USER32(00000000), ref: 004047A5
                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 004047D0
                                                                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404813
                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00404821
                                                                                                                  • SetCursor.USER32(00000000), ref: 00404824
                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0040483D
                                                                                                                  • SetCursor.USER32(00000000), ref: 00404840
                                                                                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040486F
                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404881
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                  • String ID: : Completed$N
                                                                                                                  • API String ID: 3103080414-2140067464
                                                                                                                  • Opcode ID: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                                                                                                                  • Instruction ID: bd26b540472948519bfd0c296b0258925a36bd111cdc3ec084d9598cfd27fd02
                                                                                                                  • Opcode Fuzzy Hash: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                                                                                                                  • Instruction Fuzzy Hash: A16180B1900209FFDB10AF61DD85AAA7B69FB84314F00853AFA05B62D1C7789D61CF99
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                  • DrawTextW.USER32(00000000,00429220,000000FF,00000010,00000820), ref: 00401156
                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                  • String ID: F
                                                                                                                  • API String ID: 941294808-1304234792
                                                                                                                  • Opcode ID: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                                                                                                                  • Instruction ID: ce1ac2179a7edcd12a9bbec6f3b07c603adbad34dac6b1105353c89659c02e28
                                                                                                                  • Opcode Fuzzy Hash: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                                                                                                                  • Instruction Fuzzy Hash: 63417B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0CB74DA55DFA4
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004062E8,?,?), ref: 00406188
                                                                                                                  • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 00406191
                                                                                                                    • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                                                                                                                    • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                                                                                                                  • GetShortPathNameW.KERNEL32(?,004275A8,00000400), ref: 004061AE
                                                                                                                  • wsprintfA.USER32 ref: 004061CC
                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,004275A8,C0000000,00000004,004275A8,?,?,?,?,?), ref: 00406207
                                                                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406216
                                                                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040624E
                                                                                                                  • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004269A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062A4
                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 004062B5
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062BC
                                                                                                                    • Part of subcall function 00405FF7: GetFileAttributesW.KERNELBASE(00000003,004030BD,00438800,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                                                                                                                    • Part of subcall function 00405FF7: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                  • String ID: %ls=%ls$[Rename]
                                                                                                                  • API String ID: 2171350718-461813615
                                                                                                                  • Opcode ID: dc4682ef79e092581efd41d4f88914fec7f2984e6363dc945e8c6098decd7ff7
                                                                                                                  • Instruction ID: ee14a5085299e91e75cde0480e6b7733258fb9cdf367bc6c01a907801337673b
                                                                                                                  • Opcode Fuzzy Hash: dc4682ef79e092581efd41d4f88914fec7f2984e6363dc945e8c6098decd7ff7
                                                                                                                  • Instruction Fuzzy Hash: 03312130201715BFD2207B619D48F2B3AACEF41718F16007EBD42F62C2DE3C982586AD
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004044E7
                                                                                                                  • GetSysColor.USER32(00000000), ref: 00404525
                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00404531
                                                                                                                  • SetBkMode.GDI32(?,?), ref: 0040453D
                                                                                                                  • GetSysColor.USER32(?), ref: 00404550
                                                                                                                  • SetBkColor.GDI32(?,?), ref: 00404560
                                                                                                                  • DeleteObject.GDI32(?), ref: 0040457A
                                                                                                                  • CreateBrushIndirect.GDI32(?), ref: 00404584
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2320649405-0
                                                                                                                  • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                  • Instruction ID: 38e33b6b7dbb33234eb72a45dbf2bae34717d2ad5d3f2d744b20a042554d00e7
                                                                                                                  • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                                                  • Instruction Fuzzy Hash: 072133B1500704BBCB319F68DD08B5BBBF8AF45714F04896EEB96A26E1D734E904CB58
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                                                                    • Part of subcall function 004060D8: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 004060EE
                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                  • String ID: 9
                                                                                                                  • API String ID: 163830602-2366072709
                                                                                                                  • Opcode ID: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                                                                                                                  • Instruction ID: 3c27e7501abded1006c2f30e54a373b5f9dac3b1129e645fb880415469f2e5e7
                                                                                                                  • Opcode Fuzzy Hash: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                                                                                                                  • Instruction Fuzzy Hash: 2351FA75D00219AADF20DF95CA89AAEBB79FF04304F10817BE541B62D0D7B49D82CB59
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 004067F1
                                                                                                                  • CharNextW.USER32(?,?,?,00000000,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406800
                                                                                                                  • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406805
                                                                                                                  • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406818
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Char$Next$Prev
                                                                                                                  • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                  • API String ID: 589700163-4010320282
                                                                                                                  • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                                                                  • Instruction ID: 0f69a0116b7f1ba106e871a719c63b07a343e19011b313dcb24ddb0bfcf4baff
                                                                                                                  • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                                                                  • Instruction Fuzzy Hash: CE11862A80161299D7303B149D40A7762FCEF98764F56843FE986732C0E77C4CD286BD
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E39
                                                                                                                  • GetMessagePos.USER32 ref: 00404E41
                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00404E5B
                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E6D
                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404E93
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Message$Send$ClientScreen
                                                                                                                  • String ID: f
                                                                                                                  • API String ID: 41195575-1993550816
                                                                                                                  • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                  • Instruction ID: 39da0b83e90955b658913b401ee9b713f1841a36fe6a8bad0240d4c742fa7cb5
                                                                                                                  • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                                                  • Instruction Fuzzy Hash: E9018C72A0021DBADB00DBA4CD81FFEBBB8AF55710F10002BBA51B61C0C7B49A018BA4
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                                                                  • MulDiv.KERNEL32(00009E00,00000064,096039F0), ref: 00402FDC
                                                                                                                  • wsprintfW.USER32 ref: 00402FEC
                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                                                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                                                                                                  Strings
                                                                                                                  • verifying installer: %d%%, xrefs: 00402FE6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                  • String ID: verifying installer: %d%%
                                                                                                                  • API String ID: 1451636040-82062127
                                                                                                                  • Opcode ID: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                                                                                                                  • Instruction ID: 6e758109fa8cded6d2ea51641b68a6ee4e1df044416b280c1a6c4c5bd582b841
                                                                                                                  • Opcode Fuzzy Hash: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                                                                                                                  • Instruction Fuzzy Hash: B1014F7164020DABEF609F60DE4ABEA3B69FB00345F008039FA06B51D1DBB999559F58
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2667972263-0
                                                                                                                  • Opcode ID: 434c5aa2fa4661cc93f8b90accf7d486b4cf32dd195f8743aa915133d4078579
                                                                                                                  • Instruction ID: f067c9a989b14af8d706ebefa04c24d1529afff37e35bb6a261b9bb9a52bb1c4
                                                                                                                  • Opcode Fuzzy Hash: 434c5aa2fa4661cc93f8b90accf7d486b4cf32dd195f8743aa915133d4078579
                                                                                                                  • Instruction Fuzzy Hash: 71318F71D01114BBCF216FA5CE49D9EBE79EF09364F14023AF550762E0CB794D429B98
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A7B
                                                                                                                  • GetLastError.KERNEL32 ref: 00405A8F
                                                                                                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405AA4
                                                                                                                  • GetLastError.KERNEL32 ref: 00405AAE
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                  • API String ID: 3449924974-3081826266
                                                                                                                  • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                                                                  • Instruction ID: 227e2837d2f0abbefd05ded2a29fab346f6aadb36d837cb996d7b4b6dfe3b4b1
                                                                                                                  • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                                                                  • Instruction Fuzzy Hash: A7010C71D00219EEDF009B90D948BEFBBB8EB04314F00413AD945B6181D77896488FE9
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseEnum$DeleteValue
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1354259210-0
                                                                                                                  • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                                                                                                  • Instruction ID: cc42e232b24e5cb949d5075bafdc516cc04fbeb950a3b4618317dae0e566d145
                                                                                                                  • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                                                                                                  • Instruction Fuzzy Hash: F3216B7150010ABBDF11AF90CE89EEF7B7DEB50384F100076F909B21E1D7B49E54AA68
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                                                                  • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1849352358-0
                                                                                                                  • Opcode ID: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                                                                                                                  • Instruction ID: 2ec253bf93b3ee2af7d9c2e9edfaee5893d577595a7c220e34a49f748079806b
                                                                                                                  • Opcode Fuzzy Hash: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                                                                                                                  • Instruction Fuzzy Hash: 9F212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389D51DB98
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetDC.USER32(?), ref: 00401E51
                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                                                                    • Part of subcall function 00406544: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                                                                                                                    • Part of subcall function 00406544: lstrlenW.KERNEL32(: Completed,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                                                                                                                  • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2584051700-0
                                                                                                                  • Opcode ID: 02c220045fa4ce37a47a4a385f421aa4e4c5bbcd39f6b6b3310c1ad1e6cfa2ab
                                                                                                                  • Instruction ID: 4fb721614cfc657e7ae40bea064ac1047d1e810b67000393f6ef8132d91dbde4
                                                                                                                  • Opcode Fuzzy Hash: 02c220045fa4ce37a47a4a385f421aa4e4c5bbcd39f6b6b3310c1ad1e6cfa2ab
                                                                                                                  • Instruction Fuzzy Hash: E101D471940651EFEB006BB4AE8ABEA3FB0AF15305F10497AF541B61E2CAB90404DB2C
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend$Timeout
                                                                                                                  • String ID: !
                                                                                                                  • API String ID: 1777923405-2657877971
                                                                                                                  • Opcode ID: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                                                                                                                  • Instruction ID: 9cc957e5ccccb3d4664e0e2a58dae5c7f5d60dbdf5ff161d76b900271ba72f5e
                                                                                                                  • Opcode Fuzzy Hash: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                                                                                                                  • Instruction Fuzzy Hash: B9219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                                                                                                                  • wsprintfW.USER32 ref: 00404DBA
                                                                                                                  • SetDlgItemTextW.USER32(?,00423708), ref: 00404DCD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                                                                  • String ID: %u.%u%s%s
                                                                                                                  • API String ID: 3540041739-3551169577
                                                                                                                  • Opcode ID: cb7f8dab6708f5147347d1028f1fb4ade6693c058ac397d9bbab0fb1ec6fa22d
                                                                                                                  • Instruction ID: e9142b657f1eeb4cf11744ba9db0a0194b5dde25e0a765d2a17d7598676c161e
                                                                                                                  • Opcode Fuzzy Hash: cb7f8dab6708f5147347d1028f1fb4ade6693c058ac397d9bbab0fb1ec6fa22d
                                                                                                                  • Instruction Fuzzy Hash: E911D8736041283BDB10666D9C45FAE3298DF81338F254237FA25F61D1D978D82182D8
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                                                                    • Part of subcall function 00405569: lstrlenW.KERNEL32(004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                                                                                                                    • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                                                                                                                    • Part of subcall function 00405569: lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                                                                                                                    • Part of subcall function 00405569: SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                                                                                                                    • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                                                                                                                    • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                                                                                                                    • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                                                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                  • String ID: bx
                                                                                                                  • API String ID: 334405425-3978585271
                                                                                                                  • Opcode ID: 7ea030e97ce8f00b6d550c260edd52cfb793c86c81dd28cdf80d4cf11e1f0e07
                                                                                                                  • Instruction ID: 94cae06f4fc191ca30d479cf411a95ccd627b95a6d871bbe988cbf7c6203fea7
                                                                                                                  • Opcode Fuzzy Hash: 7ea030e97ce8f00b6d550c260edd52cfb793c86c81dd28cdf80d4cf11e1f0e07
                                                                                                                  • Instruction Fuzzy Hash: 0D21F231904104FBCF11AFA5CF48A9E7A71BF48354F20013BF501B91E0DBBD8A92965D
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405DDC
                                                                                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405DE6
                                                                                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405DF8
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DD6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                  • API String ID: 2659869361-3081826266
                                                                                                                  • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                  • Instruction ID: 7ce36c7f15bc9200e130dd8400e4741a81934e97230acaa32a90c98a69430a15
                                                                                                                  • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                                                  • Instruction Fuzzy Hash: 09D0A7311019347AC1117B44AC04DDF67ACEE86304381403BF101B70A4CB7C5D518BFD
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,00403847,?), ref: 0040302C
                                                                                                                  • GetTickCount.KERNEL32 ref: 0040304A
                                                                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                                                                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,00403847,?), ref: 00403075
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2102729457-0
                                                                                                                  • Opcode ID: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                                                                                                                  • Instruction ID: a5ec5a94053ed6ec85071f05b03f47ec4a0cd54214f56ca0ac695578935c79f2
                                                                                                                  • Opcode Fuzzy Hash: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                                                                                                                  • Instruction Fuzzy Hash: 44F05430603620EBC2316F10FD0898B7B69FB04B43B424C7AF041B11A9CB7609828B9C
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                                                                                                                    • Part of subcall function 00405E81: CharNextW.USER32(?,?,00425F10,?,00405EF5,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E8F
                                                                                                                    • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405E94
                                                                                                                    • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405EAC
                                                                                                                  • lstrlenW.KERNEL32(00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F37
                                                                                                                  • GetFileAttributesW.KERNEL32(00425F10,00425F10,00425F10,00425F10,00425F10,00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405F47
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405EDE
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                  • API String ID: 3248276644-3081826266
                                                                                                                  • Opcode ID: 35502845658bd9c497c4a55af97ec41c1cd1fbb9e0c21b6c2721f1846b66cb6f
                                                                                                                  • Instruction ID: 801aa802fb238c59ad0d4c26bfab73d63669863fdcce98965586ad3d6a32a901
                                                                                                                  • Opcode Fuzzy Hash: 35502845658bd9c497c4a55af97ec41c1cd1fbb9e0c21b6c2721f1846b66cb6f
                                                                                                                  • Instruction Fuzzy Hash: CCF0D135105D6226D622333A9C09AAF1508CF82364B5A053FBCD1B22D1DF3C8A53DDBE
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • IsWindowVisible.USER32(?), ref: 0040550C
                                                                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040555D
                                                                                                                    • Part of subcall function 004044AF: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044C1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3748168415-3916222277
                                                                                                                  • Opcode ID: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                                                                                                                  • Instruction ID: 896dd7550c11452a1c115f53988c63f353f89721b9370a05553ad38a214c3fb8
                                                                                                                  • Opcode Fuzzy Hash: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                                                                                                                  • Instruction Fuzzy Hash: 1601B171200609BFDF219F11DC81A6B3A27FB84354F100036FA01762D5C77A8E52DE5A
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,004226E8,00000000,?,?,: Completed,?,?,0040663C,80000002), ref: 0040641B
                                                                                                                  • RegCloseKey.ADVAPI32(?,?,0040663C,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,00000000,004226E8), ref: 00406426
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseQueryValue
                                                                                                                  • String ID: : Completed
                                                                                                                  • API String ID: 3356406503-2954849223
                                                                                                                  • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                                                                  • Instruction ID: c9f3435c3b1d2fe912d053175b0111224322d1506dc3db2c62222be5ebead77b
                                                                                                                  • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                                                                  • Instruction Fuzzy Hash: D2017172500209ABDF21CF51CC06EDB3BB9EB55354F014039FD1592150D738D964DB94
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403AF9,00403A28,?), ref: 00403B3B
                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00403B42
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B21
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Free$GlobalLibrary
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                  • API String ID: 1100898210-3081826266
                                                                                                                  • Opcode ID: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                                                                                                                  • Instruction ID: 69a7d7bec05ee7f0f22c4a872385324a298b9ba4725761c8be5e054fe1390d88
                                                                                                                  • Opcode Fuzzy Hash: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                                                                                                                  • Instruction Fuzzy Hash: 25E0EC3750116097C6215F45EA08B5EBBB9AF54B26F09013AE9807B27187746C428B98
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp\RarSFX0,004030E9,C:\Users\user\AppData\Local\Temp\RarSFX0,C:\Users\user\AppData\Local\Temp\RarSFX0,00438800,00438800,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405E28
                                                                                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\AppData\Local\Temp\RarSFX0,004030E9,C:\Users\user\AppData\Local\Temp\RarSFX0,C:\Users\user\AppData\Local\Temp\RarSFX0,00438800,00438800,80000000,00000003), ref: 00405E38
                                                                                                                  Strings
                                                                                                                  • C:\Users\user\AppData\Local\Temp\RarSFX0, xrefs: 00405E22
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CharPrevlstrlen
                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\RarSFX0
                                                                                                                  • API String ID: 2709904686-3897259285
                                                                                                                  • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                                                  • Instruction ID: b9880c769af8d41d832fb6ed8dc33ce50b4fd52cea508e3b62d11b70b6cf9f92
                                                                                                                  • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                                                  • Instruction Fuzzy Hash: 98D0A7B3410D20AEC3126B04EC04D9F73ACFF5130078A4427F581A71A4D7785D818EEC
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  APIs
                                                                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                                                                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405F84
                                                                                                                  • CharNextA.USER32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F95
                                                                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1794325134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000001.00000002.1794302744.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794361875.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000414000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000427000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794375611.0000000000436000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  • Associated: 00000001.00000002.1794502365.000000000043B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_400000_Celery V3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 190613189-0
                                                                                                                  • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                                                                  • Instruction ID: 4f09c4eeff833ffafa08c7ff84761216a5ad6e9a06c03d1ebffd7ec4ed62f0c5
                                                                                                                  • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                                                                  • Instruction Fuzzy Hash: 53F06231505818FFD7029FA5DD04D9EBBA8EF06254B2540AAE940F7250D678DE019BA9
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:15.3%
                                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                                  Signature Coverage:0%
                                                                                                                  Total number of Nodes:16
                                                                                                                  Total number of Limit Nodes:1
                                                                                                                  execution_graph 11138 26b4cb0 11139 26b4ccc 11138->11139 11142 26be409 11139->11142 11140 26b4d2b 11143 26be418 11142->11143 11147 26be911 11143->11147 11151 26be920 11143->11151 11144 26be437 11144->11140 11148 26be920 11147->11148 11149 26bea24 11148->11149 11155 26be53c 11148->11155 11149->11149 11153 26be947 11151->11153 11152 26bea24 11152->11152 11153->11152 11154 26be53c CreateActCtxA 11153->11154 11154->11152 11156 26bf9b0 CreateActCtxA 11155->11156 11158 26bfa73 11156->11158

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2841 26bf9a4-26bfa71 CreateActCtxA 2843 26bfa7a-26bfad4 2841->2843 2844 26bfa73-26bfa79 2841->2844 2851 26bfae3-26bfae7 2843->2851 2852 26bfad6-26bfad9 2843->2852 2844->2843 2853 26bfae9-26bfaf5 2851->2853 2854 26bfaf8 2851->2854 2852->2851 2853->2854 2856 26bfaf9 2854->2856 2856->2856
                                                                                                                  APIs
                                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 026BFA61
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2854349931.00000000026B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_26b0000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Create
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2289755597-0
                                                                                                                  • Opcode ID: b154632ca79bb97114b65436a1145625324cfea3f5a07543734e9b60b2ad1cbd
                                                                                                                  • Instruction ID: 569e763a8565bccfd7302d566794410fd91af484ae09a6cfcb11c993817443c2
                                                                                                                  • Opcode Fuzzy Hash: b154632ca79bb97114b65436a1145625324cfea3f5a07543734e9b60b2ad1cbd
                                                                                                                  • Instruction Fuzzy Hash: B94105B0C00619CFDB28DFA9C844BDEBBF5BF45304F24805AD408AB265DB756986CF90
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 2857 26be53c-26bfa71 CreateActCtxA 2860 26bfa7a-26bfad4 2857->2860 2861 26bfa73-26bfa79 2857->2861 2868 26bfae3-26bfae7 2860->2868 2869 26bfad6-26bfad9 2860->2869 2861->2860 2870 26bfae9-26bfaf5 2868->2870 2871 26bfaf8 2868->2871 2869->2868 2870->2871 2873 26bfaf9 2871->2873 2873->2873
                                                                                                                  APIs
                                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 026BFA61
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2854349931.00000000026B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_26b0000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Create
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2289755597-0
                                                                                                                  • Opcode ID: f6c6fc16bd638c1da45e510bea45e3a4c0a671b757539514bb43c9b91b5882c7
                                                                                                                  • Instruction ID: d02668e357dcef86e2bfbf247eaf3b7619a7762744213b99e78b80268f0b0a8d
                                                                                                                  • Opcode Fuzzy Hash: f6c6fc16bd638c1da45e510bea45e3a4c0a671b757539514bb43c9b91b5882c7
                                                                                                                  • Instruction Fuzzy Hash: B641D4B0C00619DFDB28DFA9C944BDDBBF5BF45304F24805AE408AB265DBB56985CF90
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 3086 25dd4b4-25dd4c6 3087 25dd4cc 3086->3087 3088 25dd55a-25dd561 3086->3088 3089 25dd4ce-25dd4da 3087->3089 3088->3089 3090 25dd566-25dd56b 3089->3090 3091 25dd4e0-25dd502 3089->3091 3090->3091 3093 25dd504-25dd522 3091->3093 3094 25dd570-25dd585 3091->3094 3097 25dd52a-25dd53a 3093->3097 3098 25dd53c-25dd544 3094->3098 3097->3098 3099 25dd592 3097->3099 3100 25dd587-25dd590 3098->3100 3101 25dd546-25dd557 3098->3101 3100->3101
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2853725332.00000000025DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025DD000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_25dd000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 2e643ebc740f87b3dafe8d721c45b718e492969cbd19c9dcc6fb421eb6f2273f
                                                                                                                  • Instruction ID: ed3adae8912f5aec5f14a3aa8b63c35fc0287e87998ddc47d924839eddc5728e
                                                                                                                  • Opcode Fuzzy Hash: 2e643ebc740f87b3dafe8d721c45b718e492969cbd19c9dcc6fb421eb6f2273f
                                                                                                                  • Instruction Fuzzy Hash: C9210372501240EFDB25DF18D9C0B27BF75FB84318F24C569E8094B256C336E856CBA2
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 3117 25ed01c-25ed02e 3118 25ed0bd-25ed0c4 3117->3118 3119 25ed034 3117->3119 3120 25ed036-25ed042 3118->3120 3119->3120 3122 25ed048-25ed06a 3120->3122 3123 25ed0c9-25ed0ce 3120->3123 3124 25ed06c-25ed086 3122->3124 3125 25ed0d3-25ed0e8 3122->3125 3123->3122 3128 25ed08e-25ed09d 3124->3128 3129 25ed09f-25ed0a7 3125->3129 3128->3129 3130 25ed0f5 3128->3130 3131 25ed0ea-25ed0f3 3129->3131 3132 25ed0a9-25ed0ba 3129->3132 3131->3132
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2853818126.00000000025ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 025ED000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_25ed000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: bb96f0e808a6e47c50e7fa5ef864348c4f670612561477882c05c26b5a910c13
                                                                                                                  • Instruction ID: c15150c5a5caf5836e025c36c0130954b8dc3138085443ab667493e932502f0e
                                                                                                                  • Opcode Fuzzy Hash: bb96f0e808a6e47c50e7fa5ef864348c4f670612561477882c05c26b5a910c13
                                                                                                                  • Instruction Fuzzy Hash: 48212F71604200DFDF18DF24D984B26BFB9FB84314F28C969D80A4B256D33AD847CA65
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2853818126.00000000025ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 025ED000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_25ed000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 2467ea1a7193deac1f515a196202d647d73e2ef4b190e67a7821124837be5e5c
                                                                                                                  • Instruction ID: 91cf6d6c64ac32fc6c51c4cf13bec3f6848877a0a3d80db25315db1a08660ea7
                                                                                                                  • Opcode Fuzzy Hash: 2467ea1a7193deac1f515a196202d647d73e2ef4b190e67a7821124837be5e5c
                                                                                                                  • Instruction Fuzzy Hash: 4F212675904240EFDF09DF14DAC0B26BFB9FB84314F24CAADD84A4B255C33AD446CA65
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2853818126.00000000025ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 025ED000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_25ed000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 36e26697f2090cefaf286287e3ee823119dab0124444a788726f35609c9d2064
                                                                                                                  • Instruction ID: dac2f701ed72bd347d33ca5121ec2755ec340a651c17d5c8aba5aee660cab02d
                                                                                                                  • Opcode Fuzzy Hash: 36e26697f2090cefaf286287e3ee823119dab0124444a788726f35609c9d2064
                                                                                                                  • Instruction Fuzzy Hash: 7A219F755093C08FCB06CF24D994715BF71FB46214F28C5DAD8898F667C33A980ACB62
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2853725332.00000000025DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025DD000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_25dd000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                                                                                                                  • Instruction ID: 6bc6ca88e8dfa698d0f8073bb08fc39e9df74cc665ceae8f7afd985ea2bfa81d
                                                                                                                  • Opcode Fuzzy Hash: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                                                                                                                  • Instruction Fuzzy Hash: 6111E676504280DFCB16CF14D9C4B16BF71FB94318F24C6A9DC094B656C336D85ACBA2
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000013.00000002.2853818126.00000000025ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 025ED000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_19_2_25ed000_RegAsm.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 17de7163a1e12a4c5df783ee0f29f24f6994aba7d146e6d7d26c00eb2d5c80d5
                                                                                                                  • Instruction ID: 79cb01fa2618b466ab87cf0d7700058feeacf32c85273a8f37a618e535cfd371
                                                                                                                  • Opcode Fuzzy Hash: 17de7163a1e12a4c5df783ee0f29f24f6994aba7d146e6d7d26c00eb2d5c80d5
                                                                                                                  • Instruction Fuzzy Hash: 99118B75904280DFDB16CF14D6C4B15BFB1FB84218F28C6AAD84A4B656C33AD44ACB61
                                                                                                                  Uniqueness

                                                                                                                  Uniqueness Score: -1.00%